Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0 9815051466, 9789815051469

Blockchain technology is part of the 4th industrialrevolution of Industry and has generated a lot of potential for stake

328 58 13MB

English Pages 135 [137] Year 2022

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Cover
Title
Copyright
End User License Agreement
Contents
Preface
List of Contributors
Blockchain for IoT Security and Privacy: Challenges, Application Areas and Implementation Issues
Chaitali Choudhary1,*, Inder Singh1,* and Mohammad Shafiq2
INTRODUCTION
Blockchain and its Key Concepts
Working of Blockchain
Blockchain Structure and its Operations
Algorithms and Techniques
Trust Essentials and Consensus Protocols
IOT Security
Ongoing Researches
IoT Security using Blockchain
IoT Security using Fog Computing
IoT Security using Machine Learning
IoT Security using Cryptography/Steganography
Blockchain as Key to IoT Security
Blockchain IoT Security: Implementation Challenges
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Distributed Ledger Technology and its Potential Applications – Financial Sector
Sachin Sharma1,* and Kamal Kumar2
INTRODUCTION
RECENT WORK IN DLT
Early Adopters
Followers
New Entrants (2019)
DLT FEATURES AND PROPERTIES
DLT Based Blockchain in Digital Currencies
DLT Features
Distributed Property of the Ledger
Validation using “Consensus Mechanism”
Digital Signatures and Hash Functions
DLT ADVANTAGES
No Middleman and Decentralized in Nature
Improved Auditability and Enhanced Transparency
Perpetual and Testable
Speed and Efficiency Gain
Reducing Cost
Improved cybersecurity Elasticity
DLT RISKS AND CHALLENGES
Technical Issues
Immature Technology
Transaction Response Time and Scalability
Integration and Compatibility
Legal and Regulatory Issues
Industry Standards and Regulatory Evaluation
Jurisdiction and Ownership - Legal Clarity
Customer Due Diligence and Know-Your-Customer
Dispute Resolution Mechanism
Privacy
Infrastructure Cost
DLT APPLICATIONS
DLT AND FINANCIAL INCLUSION
CROSS BORDER REMITTANCE AND PAYMENT
Ripple
Abra
Bitpesa
Bitt
SMART CONTRACTS
EXPERIMENT PRACTICES
Project Jasper
Phase I
Phase II
Phase III
Project BLOCKBASTER
Project SALT
Project UBIN
Project Stella
Project Khokha
Project INTHANON
SUMMARY
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Implementation of Blockchain Technology for Big Data
Yasir Afaq1, Shaik Vaseem Akram2,*, Rajesh Singh2 and Mohammad Shafiq3
INTRODUCTION
CATEGORIES OF BLOCKCHAIN
Generation of Blockchain
Blockchain 1.0
Blockchain 2.0
Blockchain 3.0
Significance of Blockchain Technology and Decentralization and its Effect
Security
Transparency
Inexpensive
Transaction Time
Financial Efficiency
Protect Business from Frauds
Applications of Blockchain Technology
Health Care
Education
Public Services
Cyber Security
BIG DATA
Significance of Big Data
Cost saving
Time Reduction
Understand the market Condition
Control Online Reputation
Using Big Data Analytics to Boost Customer Acquisition and Retention
Usage of Big Data Analytics to Solve Problems and Promotional Insights into Advertisers
Big Data Analytics as a Catalyst of Product Creation and Innovation
Challenges in Big Data
Data Mining Techniques for Big Data
Clustering
Classification
Association Mining Rules
Regression
Social Network Analysis
Applications of Big Data
Healthcare Sector
Education Sector
Challenges Concerning the Application of Big Data in Education
Remote Sensing
Big Data Analysis Tools and Techniques
Hadoop
Spark
Storm
Cassandra
Mongo DB
Big Data Techniques
INTEGRATION OF BLOCKCHAIN AND BIG DATA
Data Integrity
Manage Data Sharing
Preventing Malicious Activity
Predictive Analysis
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Hydroponics Monitoring System Based on IoT and Blockchain
Harpreet Singh Bedi1,*, Raghav Gupta1, Manoj Sindhwani1 and Kamal Kumar Sharma1
INTRODUCTION
DISCUSSION
Hydroponics
BLOCKCHAIN SOLUTIONS FOR IOT
Features
Blockchain Types
Public Blockchain
Private Blockchain
Consortium Blockchain
Greenhouse
Hardware
Server and Cloud
WORKING
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Recent Trends in IoT Healthcare-based Blockchain Solutions
Himanshu Sharma1, Hardik Chaurasia1, Arpit Jain2,* and Nazir Ahmed1
INTRODUCTION
Healthcare
Blockchain
IOT
Integrated Solutions using BCT and IoT
BCT and IoT Integrated for Healthcare
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Blockchain Technology-based System in Vehicular Ad-hoc Network
Manoj Sindhwani1, Charanjeet Singh1,* and Rajeshwar Singh2
INTRODUCTION
ARCHITECTURE OF VANETS
COMMUNICATION ARCHITECTURE OF VANET
BLOCKCHAIN MEETS VANET
TRUST BASED MODELS IN VANET FOR BLOCKCHAIN TECHNOLOGY
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Subject Index
Back Cover
Recommend Papers

Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0
 9815051466, 9789815051469

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0 Edited by Rajesh Singh

Uttaranchal University, Dehradun, Uttarakhand India

Anita Gehlot

Uttaranchal University, Dehradun, Uttarakhand India

Bhavesh Dharmani

Lovely Professional University, Jalandhar, Punjab India

& Kamal Kumar

National Institute of Technology, Srinagar (Garhwal) Uttrakhand India

Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0 Editors: 5DMHVK6LQJK$QLWD*HKORW%KDYHVK'KDUPDQLDQG.DPDO.XPDU ISBN (Online):  ISBN (Print):  ISBN (Paperback):  © 2022, Bentham Books imprint. Published by Bentham Science Publishers Pte. Ltd. Singapore. All Rights Reserved. First published in 2022.

BSP-EB-PRO-9789815051452-TP-125-TC-06-PD-20221130

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use) This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work. Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules: 1. All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement. 2. You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it. 3. The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer: Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability: In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General: 1. Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims). 2. Your rights under this License Agreement will automatically terminate without notice and without the

need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights. 3. You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail. Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

BSP-EB-PRO-9789815051452-TP-125-TC-06-PD-20221130

CONTENTS PREFACE ................................................................................................................................................ i LIST OF CONTRIBUTORS .................................................................................................................. ii CHAPTER 1 BLOCKCHAIN FOR IOT SECURITY AND PRIVACY: CHALLENGES, APPLICATION AREAS AND IMPLEMENTATION ISSUES ......................................................... Chaitali Choudhary, Inder Singh and Mohammad Shafiq INTRODUCTION .......................................................................................................................... Blockchain and its Key Concepts ........................................................................................... Working of Blockchain ........................................................................................................... Blockchain Structure and its Operations ................................................................................. Algorithms and Techniques .................................................................................................... Trust Essentials and Consensus Protocols .............................................................................. IOT Security ............................................................................................................................ Ongoing Researches ................................................................................................................ IoT Security using Blockchain ...................................................................................... IoT Security using Fog Computing ............................................................................... IoT Security using Machine Learning ........................................................................... IoT Security using Cryptography/Steganography ......................................................... Blockchain as Key to IoT Security ......................................................................................... Blockchain IoT Security: Implementation Challenges ........................................................... CONCLUSION ............................................................................................................................... CONSENT FOR PUBLICATION ................................................................................................ CONFLICT OF INTEREST ......................................................................................................... ACKNOWLEDGEMENT ............................................................................................................. REFERENCES ............................................................................................................................... CHAPTER 2 DISTRIBUTED LEDGER TECHNOLOGY AND ITS POTENTIAL APPLICATIONS – FINANCIAL SECTOR ......................................................................................... Sachin Sharma and Kamal Kumar INTRODUCTION .......................................................................................................................... RECENT WORK IN DLT ............................................................................................................. Early Adopters ........................................................................................................................ Followers ................................................................................................................................. New Entrants (2019) ............................................................................................................... DLT FEATURES AND PROPERTIES ........................................................................................ DLT Based Blockchain in Digital Currencies ........................................................................ DLT Features .......................................................................................................................... Distributed Property of the Ledger ......................................................................................... Validation using “Consensus Mechanism” ............................................................................. Digital Signatures and Hash Functions ................................................................................... DLT ADVANTAGES ..................................................................................................................... No Middleman and Decentralized in Nature .......................................................................... Improved Auditability and Enhanced Transparency .............................................................. Perpetual and Testable ............................................................................................................ Speed and Efficiency Gain ...................................................................................................... Reducing Cost ......................................................................................................................... Improved cybersecurity Elasticity .......................................................................................... DLT RISKS AND CHALLENGES ............................................................................................... Technical Issues ...................................................................................................................... Immature Technology ....................................................................................................

1 1 2 3 4 5 6 7 10 10 11 12 13 14 15 15 16 16 16 16 18 18 20 21 21 22 22 23 23 24 24 25 28 28 29 29 29 29 29 30 30 30

Transaction Response Time and Scalability ................................................................. Integration and Compatibility ....................................................................................... Legal and Regulatory Issues ................................................................................................... Industry Standards and Regulatory Evaluation ............................................................ Jurisdiction and Ownership - Legal Clarity ................................................................. Customer Due Diligence and Know-Your-Customer .................................................... Dispute Resolution Mechanism ..................................................................................... Privacy .......................................................................................................................... Infrastructure Cost ........................................................................................................ DLT APPLICATIONS ................................................................................................................... DLT AND FINANCIAL INCLUSION ......................................................................................... CROSS BORDER REMITTANCE AND PAYMENT ............................................................... Ripple ...................................................................................................................................... Abra ......................................................................................................................................... Bitpesa ..................................................................................................................................... Bitt ........................................................................................................................................... SMART CONTRACTS .................................................................................................................. EXPERIMENT PRACTICES ....................................................................................................... Project Jasper .......................................................................................................................... Phase I ........................................................................................................................... Phase II ......................................................................................................................... Phase III ........................................................................................................................ Project BLOCKBASTER ....................................................................................................... Project SALT .......................................................................................................................... Project UBIN .......................................................................................................................... Project Stella ........................................................................................................................... Project Khokha ........................................................................................................................ Project INTHANON ............................................................................................................... SUMMARY ..................................................................................................................................... CONSENT FOR PUBLICATION ................................................................................................ CONFLICT OF INTEREST ......................................................................................................... ACKNOWLEDGEMENT ............................................................................................................. REFERENCES ...............................................................................................................................

31 31 32 32 32 33 33 33 34 34 34 35 36 36 36 36 36 38 38 39 39 39 39 40 40 41 41 42 42 42 42 42 42

CHAPTER 3 IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY FOR BIG DATA .... Yasir Afaq, Shaik Vaseem Akram, Rajesh Singh and Mohammad Shafiq INTRODUCTION .......................................................................................................................... CATEGORIES OF BLOCKCHAIN ............................................................................................ Generation of Blockchain ....................................................................................................... Blockchain 1.0 ............................................................................................................... Blockchain 2.0 ............................................................................................................... Blockchain 3.0 ............................................................................................................... Significance of Blockchain Technology and Decentralization and its Effect ........................ Security .......................................................................................................................... Transparency ................................................................................................................. Inexpensive .................................................................................................................... Transaction Time .......................................................................................................... Financial Efficiency ...................................................................................................... Protect Business from Frauds ....................................................................................... Applications of Blockchain Technology ................................................................................ Health Care ...................................................................................................................

47 47 48 48 49 49 50 50 50 50 50 50 50 51 51 51

Education ...................................................................................................................... Public Services .............................................................................................................. Cyber Security ............................................................................................................... BIG DATA ....................................................................................................................................... Significance of Big Data ......................................................................................................... Cost saving .................................................................................................................... Time Reduction .............................................................................................................. Understand the market Condition ................................................................................. Control Online Reputation ............................................................................................ Using Big Data Analytics to Boost Customer Acquisition and Retention .................... Usage of Big Data Analytics to Solve Problems and Promotional Insights into Advertisers ..................................................................................................................... Big Data Analytics as a Catalyst of Product Creation and Innovation ........................ Challenges in Big Data ........................................................................................................... Data Mining Techniques for Big Data .................................................................................... Clustering ...................................................................................................................... Classification ................................................................................................................. Association Mining Rules .............................................................................................. Regression ..................................................................................................................... Social Network Analysis ................................................................................................ Applications of Big Data ........................................................................................................ Healthcare Sector .......................................................................................................... Education Sector ..................................................................................................................... Challenges Concerning the Application of Big Data in Education ........................................ Remote Sensing ...................................................................................................................... Big Data Analysis Tools and Techniques ............................................................................... Hadoop .......................................................................................................................... Spark ....................................................................................................................................... Storm ............................................................................................................................. Cassandra ..................................................................................................................... Mongo DB ..................................................................................................................... Big Data Techniques ............................................................................................................... INTEGRATION OF BLOCKCHAIN AND BIG DATA ............................................................ Data Integrity .......................................................................................................................... Manage Data Sharing .............................................................................................................. Preventing Malicious Activity ................................................................................................ Predictive Analysis ................................................................................................................. CONCLUSION ............................................................................................................................... CONSENT FOR PUBLICATION ................................................................................................ CONFLICT OF INTEREST ......................................................................................................... ACKNOWLEDGEMENT ............................................................................................................. REFERENCES ............................................................................................................................... CHAPTER 4 HYDROPONICS MONITORING SYSTEM BASED ON IOT AND BLOCKCHAIN ....................................................................................................................................... Harpreet Singh Bedi, Raghav Gupta, Manoj Sindhwani and Kamal Kumar Sharma 74 INTRODUCTION .......................................................................................................................... DISCUSSION .................................................................................................................................. Hydroponics ............................................................................................................................ BLOCKCHAIN SOLUTIONS FOR IOT .................................................................................... Features ...................................................................................................................................

52 54 54 54 55 56 56 57 57 57 57 57 57 58 58 59 59 59 59 59 59 62 63 64 65 66 66 67 67 67 67 67 68 68 69 69 69 69 69 69 70 74 74 76 76 77 78

Blockchain Types .................................................................................................................... Public Blockchain ................................................................................................................... Private Blockchain .................................................................................................................. Consortium Blockchain .......................................................................................................... Greenhouse ............................................................................................................................. Hardware ................................................................................................................................. Server and Cloud ..................................................................................................................... WORKING ...................................................................................................................................... CONCLUSION ............................................................................................................................... CONSENT FOR PUBLICATION ................................................................................................ CONFLICT OF INTEREST ......................................................................................................... ACKNOWLEDGEMENTS ........................................................................................................... REFERENCES ............................................................................................................................... CHAPTER 5 RECENT TRENDS IN IOT HEALTHCARE-BASED BLOCKCHAIN SOLUTIONS ............................................................................................................................................ Himanshu Sharma, Hardik Chaurasia, Arpit Jain and Nazir Ahmed INTRODUCTION .......................................................................................................................... Healthcare ............................................................................................................................... Blockchain .............................................................................................................................. IOT ................................................................................................................................................... Integrated Solutions using BCT and IoT ................................................................................ BCT and IoT Integrated for Healthcare .................................................................................. CONCLUSION ............................................................................................................................... CONSENT FOR PUBLICATION ................................................................................................ CONFLICT OF INTEREST ......................................................................................................... ACKNOWLEDGEMENT ............................................................................................................. REFERENCES ............................................................................................................................... CHAPTER 6 BLOCKCHAIN TECHNOLOGY-BASED SYSTEM IN VEHICULAR AD-HOC NETWORK .............................................................................................................................................. Manoj Sindhwani, Charanjeet Singh and Rajeshwar Singh INTRODUCTION .......................................................................................................................... ARCHITECTURE OF VANETS .................................................................................................. COMMUNICATION ARCHITECTURE OF VANET .............................................................. BLOCKCHAIN MEETS VANET ................................................................................................. TRUST BASED MODELS IN VANET FOR BLOCKCHAIN TECHNOLOGY .................... CONCLUSION ............................................................................................................................... CONSENT FOR PUBLICATION ................................................................................................ CONFLICT OF INTEREST ......................................................................................................... ACKNOWLEDGEMENT ............................................................................................................. REFERENCES ...............................................................................................................................

79 79 79 80 80 81 83 83 85 86 86 86 86 87 87 88 90 92 94 98 105 106 106 106 106 110 110 111 113 114 116 116 117 117 117 117

SUBJECT INDEX .................................................................................................................................... 

i

PREFACE The book aims to shed light on Blockchain technologies which are the talk of the town in current times and have attracted a lot of potential end users. The excitements engendered by blockchain technologies completely relish the great feature of their exploitation in the facilitation and usage of cryptocurrencies. Bitcoin and Ethereum are the two most illustrious examples which foster a good future for Cryptocurrencies. A blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way. As a promising technique to achieve decentralized consensus, Blockchain helps achieve benefits critical to enterprises and create extraordinary opportunities for businesses to come together in new ways. The book covers different applications of blockchain in fields including the financial sector, big data, health industry, hydroponics, and vehicle ad hoc networks. Editors are thankful to the authors for their contribution to the completion of the book.

Rajesh Singh Uttaranchal University Dehradun, Uttarakhand India Anita Gehlot Uttaranchal University Dehradun, Uttarakhand India Bhavesh Dharmani Lovely Professional University Punjab India & Kamal Kumar National Institute of Technology, Srinagar (Garhwal) Uttrakhand India

ii

List of Contributors Aayush Vats

Mechatronics Engineering, University of Petroleum and Energy Studies, India

Arpit Jain

Electrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, India

Chaitali Choudhary

School of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, India

Charanjeet Singh

Lovely Professional University, Phagwara, India

Hardik Chaurasia

Electrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, India

Harpreet Singh Bedi

School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India

Himanshu Sharma

Electrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, India

Inder Singh

School of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, Uttarakhand, India

Kamal Kumar

Computer Science and Engineering, National Institute of Technology Uttarakhand, Srinagar (Garhwal), India

Kamal Kumar Sharma School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India Manoj Sindhwani

School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India

Mohammad Shafiq

Department of Cyberspace Institute of Advanced Technology, GuangZhou University, Guangzhou, China

Nazir Ahmed

Electrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, India

Raghav Gupta

School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India

Rajesh Singh

Lovely Professional University, Punjab, India

Rajeshwar Singh

Doaba Group of Colleges, Nawanshar, India

Sachin Sharma

Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be) University, Mullana, Ambala, India

Shaik Vaseem Akram

Lovely Professional University, Punjab, India

Yasir Afaq

Lovely Professional University, Punjab, India

Cross-Industry Blockchain Technology, 2022, 1-17

1

CHAPTER 1

Blockchain for IoT Security and Privacy: Challenges, Application Areas and Implementation Issues Chaitali Choudhary1,*, Inder Singh1,* and Mohammad Shafiq2 School of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, Uttarakhand, India 2 Department of Cyberspace Institute of Advanced Technology, GuangZhou University, Guangzhou, China 1

Abstract: Blockchain and IoT are the most exciting technologies in the current world, combining these two together may resolve a lot of issues. In the current scenario, we are using IoT devices in nearly everything. By the end of this era, we can presume that all of our day-to-day use devices will be smart. But with this various issue may rise like safety, security, and performance concerns of smart devices. To resolve these issues, blockchain technology has emerged as a very powerful tool. In this chapter, the basics of blockchain along with its architecture and algorithms involved are discussed. IoT challenges and related literature are also discussed along with blockchain as an efficient technology to resolve these issues. The chapter also includes the challenges in using blockchain in IoT devices.

Keywords: Blockchain, Cryptocurrency, Distributed ledgers, IoT, Proof-ofstake, Proof-of-work. INTRODUCTION The chapter includes the two emerging technologies, blockchain and Internet of Things (IoT). Blockchain is a distributed ledger technology that maintains immutable records leading to highly secure data, whereas IoT is the technology that became an essential part of our day-to-day life. IoT applications are used in smart homes, smart cities, industrial productions, smart grids, etc. Here, we discuss various IoT related issues and blockchain technology separately and then the ways in which blockchain can be used to resolve these key challenges of IoT are discussed. Out of the various challenges of IoT, the most crucial one is secuCorresponding authors Chaitali Choudhary & Inder Singh: School of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, Uttarakhand, India; Tel: +919827180073; E-mails: [email protected] & [email protected]

*

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

2 Cross-Industry Blockchain Technology

Choudhary et al.

rity and confidentiality, which can be resolved using blockchain. Blockchain gives power to the changing digital infrastructure which can help to evolve IoT, ranging from analytics to security. IBM took an initiative of blockchain usage incognitive IoT [1]. They used it in complex trade lanes and logistics where smart contracts can be incorporated using blockchain technology register. According to IBM, three key benefits are firstly building trust using distributed ledger-based authentication system and reducing the risk of collision and tampering, secondly by cost reduction by removing intermediate or third parties, and thirdly accelerated transaction speed by reducing settlement time from days to instantaneous decisions. Blockchain and its Key Concepts Blockchain is important as it brings trust to a network, and that is the main reason behind its wide usage in various areas based on trust factors. Blockchain operates with the basic concept of peer-to-peer trust factor with zero intervention from third parties. Blockchain is a decentralized ledger of all transactions across a peerto-peer network, which means it enables the transfer of digital assets without third party intervention. Blockchain is being used in a wide range of industrial applications as listed below: a. One of the most famous is cryptocurrency, for each blockchain. Right now, there are various cryptocurrencies in existence. Out of which the most famous one is Bitcoin. Some other are Ether, USD Digital, Bitcoin Cash, Tether, Stellar, etc. b. It is used in financial transaction security in the finance industry as transactions should be open and in the form of immutable ledgers. c. Patient’s data is collected by various devices in healthcare. Such data is highly confidential and need not to be manipulated under any conditions. d. One of the major issues with government supplies is that they do not reach the designated person or department. To maintain that, government nowadays uses blockchain in supply chain management to ensure the proper delivery of essential items. e. Blockchain in supply chain management is also used in manufacturing and distribution to ensure an immutable ledger of items produced and distributed. f. It is also useful in moving point of data computation from one place to another. While doing so, our data should be secured which can be easily done using blockchain. g. Some other examples are E-voting, Key distribution, funding generation, securing public records etc.

IoT Security & Privacy

Cross-Industry Blockchain Technology 3

The most known term in the blockchain is Bitcoin. Blockchain is confused with bitcoin, but actually bitcoin is just a cryptocurrency based on blockchain. Whether Bitcoin survives or not, concepts and algorithms of blockchain form an essential backdrop of various key security-based fields. There was a scenario in 2008-09 where major financial systems were facing issues, which led to share market crumbling. Then a person named Satoshi Nakamoto introduced digital currency. Digital currency is an asset which can be transferred securely over internet. This new currency introduced by Satoshi Nakamoto is called Bitcoin [2]. Cryptocurrency is in controversy due to the reason that it does not need any central authority like bank to transfer assets [3]. Thus, many people and countries still do not authenticate it. Bitcoin uses various algorithms for verification, validation and consensus protocol for each transaction. Working of Blockchain Centralized vs. decentralized system: Consider a scenario where any person wants to buy something using credit card. This process has many stages including verification of the transaction by credit card authority, payment gateways, banks involved etc. This is an example of centralized system where everyone is connected with other with some legal process Now consider a scenario where a person directly wants to deal with another person irrespective of their location. Here these two people are going to be peers among which we need to establish a transaction in a decentralized way, which means transaction between two persons who are not at the same location and not a part of a centralized system and do not know each other. This is basic concept of decentralized system. The major issue with such systems is trust. We can build trust by framing a process to validate, verify and confirm transaction which should be a tamper proof. The overall process of doing so will include recording the transaction in distributed ledger system, making it tamper proof, creating a chain and finally implementing a consensus protocol for agreement on the verified transaction to be added in the ledger . This individual transaction is called blocks and to make it secure, a chain of blocks is created, that’s why this concept is named as blockchain. Whenever one person transfers a certain amount to others, they keep a ledger of that transaction, but to provide trust, the other person called peers comes into the picture. All these people involved also keep a copy of the ledger. This is the basic concept of an immutable distributed ledger defined in a blockchain process. Similarly, verification methods are also involved and implemented using peers. Summarizing, blockchain uses a decentralized peer-to-peer system using collective trust model for validating and verifying a distributed transaction.

4 Cross-Industry Blockchain Technology

Choudhary et al.

Blockchain Structure and its Operations The basic structure of blockchain has transaction as the core element, which is called unspent transaction outputs abbreviated as UTXOs. it is an abstraction of electronic money and have different values in different currencies. Whenever any user wants to initiate a transaction, they start by creating UTXOs or by creating a ledger using coins in the form of UTXOs. These are locked up cryptocurrencies until the transaction is complete. These are nothing but like a coin in cryptocurrencies. Each transaction needs to be validated and then broadcasted. Such validated and broadcasted transactions form a chain via digital data link. The work of validation is done by special peer nodes called miners. Miners are computationally fast computers executing a specific blockchain protocol known as proof of work protocol. Fig. (1) shows a basic operation of blockchain.

Fig. (1). Basic operation of blockchain.

It is the responsibility of peers and their computational nodes to perform each operation. There are two types of participants in blockchain: one who initiates the transaction and other who validates these transactions, known as miners. If someone wants to transfer, then they initiate a transaction, whose ledger is maintained by both the parties. Then to validate, verify and broadcast, miners come into the picture. These transactions are added to the transaction pool, which are viewed by each and every miner. If all the miners validate the block and transmit it, then there will be multiple chains whereas the blockchain is a single consistent linked chain of flux which is challenging. All miners compete to solve the puzzle for validating these transaction blocks, to win the challenge their nodes computational capacity should be high. Once a miner wins, then that node sends the block for consensus validation. This is done by broadcasting the information to all other miners. Major set of miners, minimum 51% should agree to this new block addition. Once verified, then this transaction can be added in form of block in the original blockchain. After successful addition of this block transaction, it is completed and recorded. This algorithm for solving a puzzle and finally able to

IoT Security & Privacy

Cross-Industry Blockchain Technology 5

add a block is called proof-of-work protocol. This protocol needs a lot of computation power. This is one of the biggest disadvantages of blockchain proofof-work protocol. Thus, various other protocols like proof-of-stake are used nowadays, but none of them are still as successful as this protocol. Now the question is what’s for miners here? Miners earn bitcoins for managing the blockchain. The protocol proof-of-stake uses this bitcoin earned again for solving the puzzle to add a block. So, in this case rather than using their node’s computational power, they use their earnings. This looks good but here came the problem of double spending. If a person has large number of bitcoins, these can be used to manipulate the original blockchain. Algorithms and Techniques There are two techniques for efficient validation and verification. Hashing and asymmetric key encryption. 1. The main issue with blockchain is that, it is a decentralized ledger system. So, we won’t be able to verify it by conventional methods. There must be a mechanism to establish trust in between peers. For that, public key cryptography can be used. Public key cryptography uses the concept of symmetric key, which means the key for encryption and decryption is the same. A symmetric key has some major issues like deriving the keys from the data sent and distributing keys secretly. This key distribution is a very crucial task, in symmetric encryption, it should be passed to each participant. Blockchain is a distributed framework which makes this key distribution more difficult. Public key cryptography addresses this concern by using two different keys in spite of using only one key. There must be two keys: one must be public and another one should be private. Here extracting data from a message is possible as the data encrypted using public- private key pair can be extracted or decrypted using only public key. For example, if a person wants to send a message, then the person should be sending data encrypted using its private key and then by the receiver’s public key. Receiver decrypts the data using its private key and then using sender’s public key. This ensures that only the sender can send the data and the receiver can receive the data. A popular algorithm for public-private key pair strategy is Rivest Shamir Adleman (RSA) algorithm. Another algorithm is Elliptic curve cryptography which is stronger that RSA as it uses greater number of bits, thus increasing the security as well as complexity. ECC is used in various blockchain technologies like bitcoin and Ethereum for block generation, as an addition in blockchain. 2. Hashing: It plays a critical role in blockchain’s integrity and confidentiality of data. A hash function converts input data into a unique fixed length value. The algorithm chosen for the hash function should be a one-way function and it should

6 Cross-Industry Blockchain Technology

Choudhary et al.

be collision free, or exhibit extremely low probability of collision. The first requirement is to make certain that no one can derive the original items hashed from the hash value. The second requirement is to make sure that the hash value uniquely represents the original items hashed. There should be extremely low probability that two different datasets map onto the same hash value. These requirements can be achieved by choosing a strong algorithm such as secure hash, and by using appropriately large number of bits in the hash value. The most common hash size is 256 bits and the common functions are SHA-3, SHA-256 and Keccak. 3. Transaction Integrity: It works by securing the account address uniquely; the sender should be authenticated using a digital signature before transaction and ensuring the contents of the message sent. In the blockchain, both hashing and public key cryptography are used. The first step is to generate the address using a public private key. Initially a 256-bit random number is taken and kept as a private key which is secured using a code. Secondly, the ECC algorithm is used to generate a private key from public key, after which, the user will be having our public-private key pair. Finally, a hashing function is used to extract account address from the public key. Any transaction needs to be verified for the integrity. For this, a digital signature needs to be applied to the transaction and data needs to be hashed and encrypted. The receiver gets these two things separately: original data and digitally secured hash key. The receiver then needs to recompute the hash from the original message and compare it to the received secure hash key. If it is matched, then the receiver can ensure the data is intact and no changes have been made to it, so user can accept it. Otherwise the receiver can reject the transaction. The original key and the retrieved key match only in case the messages are integral, if a message is changed, then the keys won’t match and lead to rejection from the receiver’s side. Various other things are also verified at receiver’s end like timestamp, balance, and gas balance, etc. Using this complete procedure, the integrity of the complete transaction can be checked Trust Essentials and Consensus Protocols Trust can be established in a decentralized system by using specific protocols. It can be done by validating the transaction and blocks for tamper proofing, verifying the availability of resources for transactions, and executing and confirming the transactions. The Trust Trail is defined by operations including validation of transaction, verification of gas and resources, accumulation of transactions, execution of transaction to get a new state, formation of the block, working towards consensus, finalization of the block by the bidder, and addition of the block by everyone to their chain and confirmation of the transactions. A secure chain is a single main chain with a consistent state. Every valid block

IoT Security & Privacy

Cross-Industry Blockchain Technology 7

added to this chain, adds to the trust level of the chain. Consensus Mechanisms: It is a way of reaching consensus among miners to validate the transaction, as it is a distributed ledger environment where user won’t be able to verify or validate it centrally [4]. There are two known mechanisms for consensus: Proof of work: In blockchain, every miner has to compete and being the first one to add a block in the chain. Every miner will compete to get a unique hash key in the shortest span of time. For this, they have to use their core computation resources in PoW. Such winning solution transactions used for hash calculation are then approved and a new block is added to the blockchain. These miners use a lot of computational resources to evaluate the hash function in record time. PoW protocols are used to calculate hash functions with minimal computational resources. Proof-of-Stake: As mining involves lots of computation power, Proof-of-Stake gives mining power depending on the stake of bitcoins they hold. This will ensure that only the authorized person can mine and attack on the chain. The only cryptocurrencies which use this technique is altcoins. One of the major issues with this algorithm is that users can misuse their power of high stakes. IOT Security Internet of Things (IOT) is the interconnection between smart devices, which communicate with each other. When we are talking about smart devices, this means they are able to monitor, control, optimize and automate the process in one or another way. These devices can be anything like network devices, home appliances, wearable devices, sensors, industrial instruments/machines, vehicular sensors or any embedded device. Challenges in IOT With an increase in the number of smart devices around us, IoT is an emerging technology for connecting all the devices together. Since IoT is the most talked technology right now, built with connecting devices. Due to such heterogeneity in devices, there are various challenges which the current IoT system faces. At one side, IoT is a much sought technology by various businesses and industries, but it also leads to various challenges. The challenges in IoT [5] are basically of two types- Technological challenges and Security challenges [6]. Technological challenges mainly focus on peer’s or node’s computational capacity, their interconnection, bandwidth consumption and various performance parameters adjustments. These concerns can be hardware related as well as software related. Whereas security issues can range from secure data storage, data transmission, key distribution, etc. Some of the major challenges are listed here in

8 Cross-Industry Blockchain Technology

Choudhary et al.

Fig. (2).

Fig. (2). Key challenges io IoT.

a. Security: Ask any expert the biggest challenge in this era and they will be spontaneously saying security of IoT devices. As with the increase in the number of devices, IoT increases attack surface area. Attackers do not attack main devices, rather they compromise the devices with security vulnerabilities. For example, in 2017, a casino was attacked using a thermostat in fish tank. Most of the common and damaging attacks are through home monitors, like IoT based baby or elderly monitors. There are various reported cases in which attackers attacked through toys, health monitors, wearable devices, etc. b. Regulatory Policies: There must be standard policies which should be established to properly manage, protect and transmit data in a very effective way. Lack of such strong policies is a major reason behind IoT security issues. This situation becomes more complicated with the expansion of attack surface due to usage of so many devices, and as these devices can be anything like toys, medical instruments, cars, modems etc. All the current policies established doesn’t work in variant IoT scenarios. Policies should be established to promote and standardized IoT. Quality control in IoT can be highly complicated and due to a wide range of sensors and devices imported from other countries, such policies should be worldwide acceptable. c. Integrity: Integrity is to deliver the message securely in end-to-end devices. Data may be corrupted during transmission. It should be ensured that the message is delivered securely. IoT nodes are very low computational devices, so end point security cannot be guaranteed. The only thing which can be done, is securing messages while transmitting it . For this end to end encryption, algorithms can be used. There are a wide range of such algorithms available, but the only issue is that these algorithms should be light weight. d. Availability: There is a huge amount of IoT data which is meant to be readily

IoT Security & Privacy

e.

f.

g.

h.

i.

j.

Cross-Industry Blockchain Technology 9

available for usage whenever required. One of the important features of IoT is temporal data, and it is meant to be available on time to achieve the desired results and analysis. Bandwidth: IoT devices work on distributed model whereas traditional content delivery system works on the central server-based model. This condition becomes worst with the addition of more and more devices on regular basis. Also, each device has varied bandwidth requirements, where there can be a condition for one device with high bandwidth leading to drought condition for other devices. This can be managed by intelligent switching of bandwidth between various mobile devices. Compatibility: With so many devices of various manufacturers in the market, compatibility is a big issue. We all have faced these issues while installing a smart device at our home. To resolve this issue a bit of help can be taken from software patches by the companies. But this is again an issue as we can’t ensure that each device has a system of self-updates. These issues elevate when devices work on different versions, which leads to performance degradation and security issues. Thus, most of the devices need to keep themselves maintained. Heterogeneity: IoT devices can be networking devices, home appliances, wearable devices, sensors, industrial instruments/machines, vehicular sensors or any embedded devices, which have a wide range of capabilities, connectivity and vendors. Networking between such a wide range of devices is a highly complicated issue. So, one of the major issues of IoT is establishing a connection between such heterogenous devices with various levels of working protocols and connection issues. Confidentiality: A smart device can be a human or any device which can be involved in collecting data, managing data or analysing data. Such data can be very crucial as it may include very sensitive data like personal information, health information, etc. This data needs to be protected not just from the outside world but also from other nodes. Confidentiality also means that data should only be received and processed by the authentic device. Authentication: There may be numerous devices in an IoT network, all of which should be authenticated, as there are so many devices which many attackers may fake being a genuine part of the network. All the devices in the network should be initially authenticated, and then each node trying to join should be validated by either a central authority or by mutual consent. Lightweight Solutions: This can be either considered as an aspect or constraint, as all the devices should be energy conserving and be compatible with the IoT algorithms and protocols. On the other hand, we can say that, all the algorithms devised for IoT devices should be lightweight networking protocols. As high energy consuming protocols are not compatible with IoT

10 Cross-Industry Blockchain Technology

Choudhary et al.

structures. k. Customer Expectations: IoT market is a customer-oriented segment, unless it is not a complete infrastructure-based setup, in most of the scenarios we deal with small hand-held devices or day to day usage appliances. In our daily usage, a number of devices are increasing rapidly, and with such a competitive environment, customer satisfaction is a very important factor. User’s expectations should be met otherwise there is so much competition that the same kind of devices are launched by various manufacturers. The product should be the best in the market and as per users’ expectations. l. Key Management Systems: The information transmission by IoT devices should be secure using encryption strategy. Here one of the constraints is that it must be light weight key management system which enables trusted data exchange. The key distribution should consume minimum energy for the long life of devices. There are various encryption algorithms that can perform very efficiently but we need nodes with computational capacity. Thus, the secure data management with light weight key management is a crucial issue. Ongoing Researches IoT Security using Blockchain Block-chain secures the data communication between IoT devices with safe data transmission. Rathee G. et al. [7] suggested securing wireless communication in IoT using the blockchain technique. To ensure the device is an authenticated device, to track any device activity and to maintain secrecy and transparency between peer nodes, all the objects are added in the blockchain. The suggested scheme is also used to extract the information from various nodes and preserve the extracted data into a blockchain. This ensures safety of extracted data as well as transparency among distributed nodes. It works in the same manner as we discussed in the previous sections on the working of blockchain. Any device trying to join the network should be authenticated by existing nodes in the network. If more than a particular threshold number of users accept that node, then one of the nodes can add a new user to the existing block chain. The same concept also applies to messages generated. This process of adding a node or passing a message results in transactions where each transaction can be maintained in the form of an immutable chain of successful transactions in a sequentially encoded hashing methodology. A transaction appears in a chain only if it is successful. All the messages are published as an immutable ledger that cannot be modified, and every IoT node/peer maintains the common ledger as all the other peers in the network [8]. Agrawal, R. et al. [9] proposed a blockchain based IoT structure where, trust is maintained through an immutable decentralized blockchain. As blockchain is distributed in nature making system more resilient to

IoT Security & Privacy

Cross-Industry Blockchain Technology 11

failure, this proposes a way to secure the system using device authentication using any external intervention. Every node interaction is saved as a blockchain block making its usage authenticated, and it is saved as IoT blockchain. Various prediction models are used to generate crypto-tokens for user authentication. These crypto-tokens are then improvised using ensemble methods, which uses the most efficient model. Huh, S. et al. [10] used a public-private key pair for encrypting the data and kept the public key on Ethereum blockchain and private keys were stored in individual devices. So that they could easily build key management and distribution system in an efficient manner. Managing a key using blockchain is a very common thing, but they explicitly used Ethereum as they wanted to manage it in a fine-grained manner. This can be compared with partial IoT implementation with fully scaled IoT system. It was concluded that the results showed better performance as the complete system did not have compatibility issues compared to partial devices integration with a partial structure. Their case study was on smart meters. They used data coming from smart meters and smart phones. Using Ethereum smart contract, they constantly analysed the data from smart meters, where smart phones were used to send the specified policies for air conditioners and bulbs. These devices constantly check policy updates in Ethereum smart contract to remain updated, and whenever necessary, they switch to the power saving mode and back to the normal mode as and when required. They only created a small-scale experimental setup, which needs to be checked for scaling up with multiple devices. The major issue which can be faced with multiple devices is that there can be synchronization issues with an increase in devices and consequently requests [11]. Also, our light weight IoT devices would not be able to serve so many requests parallelly which leads to denial of service. IoT Security using Fog Computing Fog computing is one of the most compatible technologies used with IoT technologies and application frameworks. Tange K. et al proposed fog enable authentication [12] for securing IoT networks. This can be done by using fog nodes as authenticating systems rather than any third-party authentication server requirements. A fog node fulfils all the requirements of the IoT network as it is lightweight, local to the network, thus leading to very minimum communication overhead and fast response time. Also fog nodes can act as part of the network on one end whereas it can be used for third party communication and data transfer without any issue of security breach. This also enhances our network by transferring some of the authentication control rights to fog node, which results in reduced computation of light weight IoT nodes. One of the open challenges in IoT security using fog node is the isolation of fog nodes for security purpose. As with legacy systems where security measures are very poor, in such systems, fog node

12 Cross-Industry Blockchain Technology

Choudhary et al.

isolation is a difficult task which is as an open challenge for researchers. IoT Security using Machine Learning IoT networks are heterogenous with a wide range of devices and different kinds of protocols and algorithms, with deployment on a massive scale with various connectivity issues using low power and low-cost communication in the close proximity without involving a central authority. It should also have selforganization and self-healing characteristics which should be dynamically managed with high security and intelligence. For such a constraint-based network, machine learning is one of the best suited techniques. The machine learning algorithms can train themselves with any external interference [13]. Such networks can adapt accordingly and can make future predictions based on the dynamic data collected at run-time. It can respond to specific problems which change with time. It can be used to detect threats and malwares. For example, Google uses ML to identify potential threats in mobile devices and endpoints. But ML is not good enough solution due to false positives and true negatives, still we can trust ML based reinforcement or unsupervised learning techniques [14]. ML based solutions need to be monitored for modifications in models and error predictions. Hasan, M. et al used various machine learning algorithms for anomaly and attack detection and compared various techniques on parameters such as accuracy, recall, precision, F1 Score, etc. They used various techniques like Decision Trees, Deep Neural Network, Artificial Neural Network, Random Forest, support Vector machine and concluded that random forest technique is the best for early prediction of various kinds of attacks. But they only have studied classical approaches rather than ensemble approach. Also, they haven’t devised a complete framework. IoT Security using Edge Computing: IoT with Edge computing is a highly researched field as it incorporates cloud in it, and IoT with cloud being a current technology in research perspective. Wang, T. et al. [15, 16] proposed that the edge networks can be very reliable in implementing trust-based message passing framework to meet special service requirements. They concluded that edge-based security framework can help in enhancing security, efficiency and performance of a cloud based IoT structure. Bhardwaj K. et al. [17] suggested that DDoS attack in the network can be reduced using edge nodes usage. As we know, in our IoT networks, devices are very light weight with less computational power and thus easily prone to DDoS attacks. These attacks are successful as our networks’ computational power is very low. In Edge based networks, high computational power is provided to edge nodes and their computational power can be utilized against such attacks. These result in early detection of such attacks leading to damage reduction. Their experimental study proved that 10x faster detection can

IoT Security & Privacy

Cross-Industry Blockchain Technology 13

reduce the 82% internet traffic due to DDoS attack. Edge computing can help in overcoming security breach issue, data compliance issues, safety issues and bandwidth issues. The data breach issues are resolved by maintaining data inside the network itself. With an edge network, we do not need to send the data outside the world leading to minimal chances of data breach. Also, in many countries, data compliance law states that data should not move outside the network, which we are very efficiently maintaining using edge nodes. Safety issues are one of the major concerns in IoT devices, if there is even a bit of a delay in transmitting data to the decision-making node which can lead to various security issues. For example, if we are creating an app for women’s safety with a SOS button in a wearable device, if there is even a bit of a delay in transmitting that data, that can lead to various hazards. In IoT, we can’t afford to transmit every data to the central cloud node due to various energy saving policies. Edge nodes help us in reducing the communication overhead by analysing data locally and only sending the crucial data in a secure manner by peer-to-peer authentication between centrally computational cloud nodes with edge node lying in and out of the IoT network. IoT Security using Cryptography/Steganography The cryptography is not much used technique in IoT, as cryptographic algorithms are too complex to be executed on light weight IoT nodes but still some scholars tried this approach too. Henriques S. et al. proposed an authentication method using both asymmetric and symmetric cryptography to secure communication between IoT devices. This leads to reduced time consumption in spite of working on an asymmetric approach. Each time, a random session key is taken which improves the security in the symmetric encryption approach. This makes the system more attack tolerant and resolves the issue of session key distribution. Further improvements can be made by using more complicated encryption techniques or by using hashing, but the only obstacle in this is less computational power of IoT nodes which would not be able to perform high end encryption algorithms. Sridhar S. et al. [18] proposed lightweight dual authentication cryptographic approach. A Light Weight Asymmetric Key cryptography is used to provide authentication between a sensor node and the device gateway. The sensor node unique Id and device gateway’s unique Id are used to create a secret key/digital certificate using AES Algorithm. The device gateway and the cloud service are mutually authenticated using public Key Encryption Digital Signature. They proposed a double authentication scheme which resulted in reducing the traffic by eliminating faulty and fake data chunks and thus provided security and enhanced the performance by reducing bandwidth usage. Khari M. et al. [19] worked on elliptic Galois cryptography algorithm which encrypted confidential data from various medical sources. Then using matrix XOR encoding

14 Cross-Industry Blockchain Technology

Choudhary et al.

steganography technique, it is embedded in a low complexity image. It also optimizes block selection using adaptive firefly algorithm to reduce computational cost. With this technique, any data can be securely transmitted using layers of images in an efficient manner. Blockchain as Key to IoT Security We can conclude that Blockchain can be very empowering technology for IoT security. It is also very helpful in various other challenges of blockchain like integrity, confidentiality, authentication and key management solutions. One of the main features of blockchain which makes it an ideal solution for IoT security is its decentralized nature which makes attackers’ work difficult. IoT frameworks are more prone to attack due to their distributed nature that means due to large number of devices, compromising any one less cared device will be quite easy. We can also summarize it earlier by saying that the surface area for attack is more in IoT framework and it keeps on increasing with each added device, which is definitely going to be increased. On the contrary, blockchain uses this distributed nature to make things secure. As blockchain is a distributed ledger system, it maintains immutable ledger records. This is the way of securing data in blockchain. The distributed framework increases the trust factor of the system . IoT and blockchain complements each other, the factor which makes IoT prone to attack is its distributed nature and blockchain uses the same factor for making it more secure. Decentralization of IoT network using blockchain also helps in resolving the issues like single point of failure and issues like cost reduction in maintaining network infrastructure. Two big companies IBM & Samsung collaborated for ADEPT [20, 21] (Autonomous Decentralized Peer-to-Peer Telemetry) which is a blockchain empowered IoT system. Blockchain system to create a distributed IoT system generates smart contract and peer to peer messaging system. One of the usages of ADEPT can be in various smart home appliances. For example, a fully automated washing machine can communicate with other devices like it can postpone the washing if many devices are plugged on simultaneously, leading to electric load balancing. If the machine has any issue, then it can create a request for maintenance or repair as needed. Right now, it looks like very futuristic project but it can be achieved very nearly. The problem appears when such a smart device which handles its own work is compromised by a hacker. One such solution is authenticity of one device is verified by all other devices at home. Let’s take an example: all the devices are based on networking, so suppose our first smart device or we can say the first block in our blockchain is modem. Whenever a new device is added then its key is a combination of both the modem key and a new device key. A chain is maintained in which there will be as many numbers of blocks as there are smart devices at home. If any one of the

IoT Security & Privacy

Cross-Industry Blockchain Technology 15

devices is hacked, then all the devices whose keys are generated using its key will also be dysfunctional. This is one of the basic usages of blockchain in securing IoT network in smart home [22]. Blockchain applications do not limit to this, they can have a number of usages in different domains on IoT. Blockchain IoT Security: Implementation Challenges There are still various issues with blockchain and IoT integration. One of the major issues is the verification of every action by all other devices, which can be sometimes quite time consuming. Also, in a network with thousands of devices, it will be really difficult to get consent of majority of nodes. For each successful transaction, the miners need to compete with each other for validating the transaction. Here our peer nodes and miner nodes all are our lightweight devices, which do not have such high-end computational capabilities. One feasible solution for this is to have a custom-made framework for maintaining blockchain. But again, the issue is to have a different third-party platform vendor for this. Even after so many security features, we can not be sure that our network is free from any security breach. In case a device is malicious or hacked immediately but for that also we need consent of majority of devices. So, we can say that if entry into this network is tough, pushing someone out of the network is also tough. Organizations should thoroughly investigate their privacy requirements and choose a proper blockchain type or request the development of a custom one until ready-made solutions appear on the mass market. CONCLUSION This chapter examined two of the most talked technologies: blockchain and the Internet of Things (IoT). Blockchain is a distributed ledger system which creates immutable records, resulting in highly secure data, while IoT is a technology that has been ingrained in our daily lives. Blockchain is a decentralized ledger which records all transactions that occur over a peer-to-peer network, which facilitates the movement of digital assets without the involvement of a third party. Blockchain technology has been used in a wide variety of industrial and research applications and fields, including cryptocurrency, financial transactions, supply chain management, health record management, and research, e-voting, key distribution, financing creation, and safeguarding public data. With the proliferation of intelligent gadgets around us, IoT is a burgeoning technology for linking these items. Security, Regulatory Policies, Integrity, Availability, Bandwidth, Heterogeneity, Compatibility, Authentication, Confidentiality, Lightweight, Consumer Expectations, and Key Management Systems are the primary problems in IoT. It is also very beneficial for other blockchain-related difficulties, such as integrity, confidentiality, authentication, and critical

16 Cross-Industry Blockchain Technology

Choudhary et al.

management solutions. One of the primary aspects of blockchain which makes it a suitable option for IoT security is its decentralized nature which makes attackers' jobs challenging. Owing to the dispersed nature of IoT frameworks, they are more vulnerable to attack. This implies that compromising even one less-cared-for device would be pretty straightforward due to the high number of devices. CONSENT FOR PUBLICATION Not applicable. CONFLICT OF INTEREST The authors declare no conflict of interest, financial or otherwise. ACKNOWLEDGEMENT Declared none. REFERENCES [1]

T. Alladi, V. Chamola, R.M. Parizi, and K.K.R. Choo, "Blockchain Applications for Industry 4.0 and Industrial IoT: A Review", IEEE Access, vol. 7, pp. 176935-176951, 2019. [http://dx.doi.org/10.1109/ACCESS.2019.2956748]

[2]

S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", Cryptography Mailing, 2009. https://metzdowd.com

[3]

A. Narayanan, and J. Clark, "Narayanan_Clark_2017_Bitcoin’s Academic Pedigree", In: Acmqueue vol. 15. , 2017, pp. 1-30.Narayanan_Clark_2017_Bitcoin’s Academic Pedigree vol. 15. , 2017, pp. 130.

[4]

L. Zhu, K. Gai, and M. Li, "Blockchain technology in internet of things", Springer International Publishing, 2019. [http://dx.doi.org/10.1007/978-3-030-21766-2]

[5]

H.F. Atlam, and G.B. Wills, IoT Security, Privacy, Safety and Ethics. Springer International Publishing, 2020. [http://dx.doi.org/10.1007/978-3-030-18732-3_8]

[6]

P.N. Mahalle, B. Anggorojati, N.R. Prasad, and R. Prasad, "Identity authentication and capability based access control (IACAC) for the internet of things", J. Cyber Secur. Mobil., vol. 1, no. 4, pp. 309-348, 2012.

[7]

G. Rathee, M. Balasaraswathi, K.P. Chandran, S.D. Gupta, and C.S. Boopathi, "A secure IoT sensors communication in industry 4.0 using blockchain technology", J. Ambient Intell. Humaniz. Comput., vol. 12, no. 1, pp. 533-545, 2021. [http://dx.doi.org/10.1007/s12652-020-02017-8]

[8]

D. Minoli, and B. Occhiogrosso, "Blockchain mechanisms for IoT security", Internet of Things, vol. 12, pp. 1-13, 2018. [http://dx.doi.org/10.1016/j.iot.2018.05.002]

[9]

S. Agrawal, "R., Verma, P., Sonanis, R., Goel, U., De, A., Kondaveeti, S. A., & Shekhar, “Continuous Security in IoT Using Blockchain", IEEE Int. Conf. Acoust. Speech Signal Process., 2018pp. 64236427. [http://dx.doi.org/10.1109/ICASSP.2018.8462513]

IoT Security & Privacy

Cross-Industry Blockchain Technology 17

[10]

S. Huh, S. Cho, and S. Kim, "Managing IoT devices using blockchain platform", Int. Conf. Adv. Commun. Technol. ICACT, 2017pp. 464-467. [http://dx.doi.org/10.23919/ICACT.2017.7890132]

[11]

A.H. Lone, and R. Naaz, "Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review", Comput. Sci. Rev., vol. 39, p. 100360, 2021. [http://dx.doi.org/10.1016/j.cosrev.2020.100360]

[12]

K. Tange, M. De Donno, X. Fafoutis, and N. Dragoni, "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities", IEEE Commun. Surv. Tutor., vol. 22, no. 4, pp. 2489-2520, 2020. [http://dx.doi.org/10.1109/COMST.2020.3011208]

[13]

L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, "IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?", IEEE Signal Process. Mag., vol. 35, no. 5, pp. 41-49, 2018. [http://dx.doi.org/10.1109/MSP.2018.2825478]

[14]

F. Hussain, R. Hussain, S.A. Hassan, and E. Hossain, "Machine Learning in IoT Security: Current Solutions and Future Challenges", IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1686-1721, 2020. [http://dx.doi.org/10.1109/COMST.2020.2986444]

[15]

T. Wang, G. Zhang, A. Liu, M.Z.A. Bhuiyan, and Q. Jin, "A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing", IEEE Internet Things J., vol. 6, no. 3, pp. 4831-4843, 2019. [http://dx.doi.org/10.1109/JIOT.2018.2870288]

[16]

K. Sha, T.A. Yang, W. Wei, and S. Davari, "A survey of edge computing-based designs for IoT security", Digital Communications and Networks, vol. 6, no. 2, pp. 195-202, 2020. [http://dx.doi.org/10.1016/j.dcan.2019.08.006]

[17]

K. Bhardwaj, J. C. Miranda, and A. Gavrilovska, "Towards IoT-DDoS prevention using edge computing", USENIX Work. Hot Top. Edge Comput. Hot Edge, co-located with USENIX ATC, 2018.

[18]

S. Sridhar, and S. Smys, "Intelligent Security Framework for IoT Devices", Int. Conf. Inven. Syst. Control Intell., pp. 1-5, 2017. IEEE.

[19]

M. Khari, A.K. Garg, A.H. Gandomi, R. Gupta, R. Patan, and B. Balusamy, "Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques", IEEE Trans. Syst. Man Cybern. Syst., vol. 50, no. 1, pp. 73-80, 2020. [http://dx.doi.org/10.1109/TSMC.2019.2903785]

[20]

E. Summary, Empowering the edge., 2014, pp. 1-8.

[21]

I.B.M. Corporation, Empowering the edge - Practical insights on a decentralized Internet of Things IBM Institute for Business Value, 2015. https://www-01.ibm.com/common/ssi/cgi-bin/ssialias? subtype=XB&infotype=PM&htmlfid=GBE03662USEN&attachment=GBE03662USEN.PDF

[22]

A. Dorri, S.S. Kanhere, R. Jurdak, and P. Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home", IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work., pp. 618-623, 2017. [http://dx.doi.org/10.1109/PERCOMW.2017.7917634]

18

Cross-Industry Blockchain Technology, 2022, 18-46

CHAPTER 2

Distributed Ledger Technology and its Potential Applications – Financial Sector Sachin Sharma1,* and Kamal Kumar2 Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be) University, Mullana, Ambala, India 2 Computer Science and Engineering, National Institute of Technology Uttarakhand, Srinagar, Garhwal, India 1

Abstract: The concept of blockchain has shown tremendous potential and growth in the last decade. The terms such as blockchain and digital ledger technology are used interchangeably. Many research efforts have been madto explain and harness the benefits of digital ledger technology for the financial sector. Digital currency or cryptocurrency is a technological currency based on the block chain concept.

Keywords: Bitcoin, Blockchain, Digital Currencies, Digital Ledger Technology, Financial Inclusion, Financial Sector, Smart Contracts. INTRODUCTION DLT utilizes existing peer-to-peer technologies such as the internet telephony, emails, file sharing and the internet. A benchmark paper written by an anonymous person “Satoshi Nakamoto” in 2008, “Bitcoin: A Peer-to-Peer Electronic Cash System”, presented a unique methodology of funds transfer using the P2P technique named “Bitcoin”. The technology described in Nakamoto’s paper was referred to as Blockchain, which explains a novel way of storing and organizing information and transactions. Other forms of information transfer and transaction technologies were devised and the term “Distributed Ledger Technology” was invented. DLT records and shares data across ledgers (multiple data stores), each controlled and managed by distributing computing devices and having the same replica of data records. These computing devices are referred to as nodes. DTL can be understood as a distributed database that possesses unique properties. Blockchain is a special type of DLT that utilises algorithms and cryptography techniques to generate and validate append-only growing data structures. The data Corresponding author Sachin Sharma: Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be) University, Mullana, Ambala, India; E-mail: [email protected]

*

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

Distributed Ledger Technology

Cross-Industry Blockchain Technology 19

structure acts as a ledger in the form of transaction blocks (chain), is referred to as a blockchain. One of the nodes create a new data block, which contains the multiple transaction records. One of the nodes initiates database addition, which in turn generates a new data “block” having multiple records of the transactions. This new block information (in encrypted format) is distributed across the network to maintain data privacy. This block validity is determined by every network participant using a consensus mechanism (algorithmic validation method). Post validation, a new block is added to the respective ledgers of all participants. Using this method, each change to the ledger leads to a ledger replication across the entire network and the entire identical ledger is available to each network member at any point of the time. This technique can be utilized for any digital transaction record. See Fig. (1) (“Dubai Aims to Be A City Built on Blockchain”. By Nikhil Lokhade, 24 Apr 2017, Wall Street Journal https://www.wsj.com/articles/dubai-aims-to-be-a-city-built-onblockchain-1493086080).

Fig. (1). Working of Blockchain based DTL.

20 Cross-Industry Blockchain Technology

Sharma and Kumar

1. DLT systems based on blockchain constitute an append-only data blocks chain. One of the nodes initiates new additions to the database and creates a new data block with multiple records of transactions. 2. Information is shared across the network about the new data blocks. The transaction details contain encrypted data. 3. All network participants use a “consensus mechanism” to determine the block’s validity. Post validation, each participant adds a new data block to their respective ledger so that a full identical copy of the entire ledger is being replicated across the entire network. Two characteristics of a DLT-based solution are: i. It eliminates the need for centralized record keeping, storing, recording and distributing digital information across the self-managed counterparties. ii. It also eliminates double-spend which means the same token cannot be distributed to multiple counterparties. RECENT WORK IN DLT The monetary policies of an economy are controlled by the central bank. A central bank controls the relevant economic management tools of an economy. The central bank's duty is to control money supply in an economy and deployment of monetary policies including interest rates management, keeping price stable for essential commodities [1]. Central banks have monopoly on the currency issuance for a given economy [2]. The emergence of Bitcoin in 2009 [3] motivated the concept of an alternative currency mode as a digital currency or crypto currency. This new form of alternative currency can be managed by private sector players or individual. Post bitcoin invention, private sector organizations or individuals have issued more than five thousand crypto currencies [4] in the last decade. The common attribute of these currencies is that they are based on digital ledger technology and are not controlled by any tangible resource. The currencies included Bitcoin [3], Stellar [5], Ripple [6], Ethereum [7], Tether [8] and others. The strict regulations and law of land requirements for the financial market are creating challenges for decentralized digital currencies. Keeping this in view of the growth and opportunities in digital currencies, central banks are investing in the research and development of digital currencies backed by central banks and governments to preserve monetary policy and financial market stability [9, 10]. The Bank for International Settlements (BIS) conducted a recent survey [11] to analyse efforts by central banks on central bank digital currency research projects.

Distributed Ledger Technology

Cross-Industry Blockchain Technology 21

The majority of central banks (>70%) replied that they were investing in the possibility of issuing a central bank digital currency (CBDC). This survey covers diverse geographies in the different jurisdictions with reachability of more than 70% of the world's population [11]. 35% of the participants were from developed economies and 65% of the survey participants were from developing economies. The level of central bank digital currency organizations are classified as a) Early Adopters, b) followers and c) new entrants. Early Adopters The early adopters are the organizations, which started investing in the technology during 2015-2016. The Bank of England published its “One Bank Research Agenda” [12] in 2015. The Bank of England collaborated with University College London in 2016 for its RS Coin CBDC [13] framework development. China's central bank, “The People's Bank of China (PBoC)” started its CBDC journey in 2016 to get control of monetary supply in China and to optimize efficiency of the payment system [14, 15]. The Bank of Canada started investment in CBDC in 2016 with R3 Project Jasper and Payments Canada [16] and then started analyzing DLT for payment transformation in the country. Germany's central bank “Deutsche Bundesbank” started project “BLOCKBUSTER” in early 2016 to utilize digital ledger for interbank settlements in Germany [17]. The Bank of France initiated the project “MADRE” in mid-June 2016 for digital currencies. Project “SALT” was started by Banco Central for Brazil in September 2016 [18]. The United States Federal Reserve published its first Central Bank Digital Currency report in September 2016 [19]. In November 2016, the Ubin project was started by Singapore's central bank and financial regulatory. The Bank of Japan and European Central Bank started the project Stalla in December 2016 [14]. Followers The organizations which started investing on digital ledger technology during 2017-2018 are classified as followers. Digital currency project LionRock was initiated by The Hong Kong Monetary Authority (HKMA) in March 2019 [20, 21]. Its aim is to utilize digital ledger technology for interbank settlement in the domestic market of Hong Kong. The Bank of Finland analyzes differences and similarities between general-purpose central bank digital currency and cash, and published a research paper in May 2017 [22]. To address the issue of declining cash use in Sweden, the central bank of Sweden started project e-Krona in September 2017 [23, 24]. To address financial inclusion issues in Uruguay, the Central Bank of Uruguay initiated its Central Bank Digital Currency project “ePeso” in November 2017 [25]. To analyze the benefits of a digital currency eShekel, Bank of Israel formulated a research team. Denmark National bank

22 Cross-Industry Blockchain Technology

Sharma and Kumar

performed a high level exploration of central bank digital currency and its impact on Denmark's financial market infrastructure, publishing its central bank digital currency report in December 2017 [26]. The South African Reserve Bank (SARB) started project Khokha in January 2018 to take benefit from DLT in the area of interbank payment settlement. The SUPCAVEN started project Petro in Venezuela to overcome US Dollar dependency and to counter US and European Union sanctions [27]. To promote Lithuania's financial service industry, a DLT based sandbox called LBChain was introduced in March 2018 [28 - 30]. The Swiss National Bank analyzed the adaptability of DLT in Switzerland financial sector in the month of April 2018 [31]. The first phase of central bank digital currency was revealed by Norges Bank of Norway in May 2018 [32]. The Reserve Bank of New Zealand published a report in May 2018, exploring DLT's role in optimizing payment system efficiency [33]. The project Inthanon was initiated by The Bank of Thailand [34] in August 2018, to explore DLT potential in the area of Thailand's FMIs. New Entrants (2019) In February 2019, the Bank of Korea published a research paper on the assessment of the impact of general purpose account-based CBDC (GA-CBDC) on the financial market stability using two distinct monetary general equilibrium models [35]. The Bank of Japan published its first official paper [36] on CBDCs to assess the potential impact of CBDCs on payment efficiency on FMIs. In May 2019, the Bank of Canada and MAS published the project Jasper-Ubin [37] report, the world's first CBDC experiment that enabled the settlement of cross-border interbank payments on two distinct DLT platforms denominated in two different currencies. The project Jasper-Ubin was based on an alternative cross-border interbank payments settlement model [38]. Under the auspices of the ECB, the ECB Crypto-Asset Task Force published an analysis of crypto-assets in May 2019 [39]. The paper provided a standardized definition for crypto-assets and examined their implications for the broader economy from the monetary policy perspective. DLT FEATURES AND PROPERTIES This section highlights the preliminary of this research work along with the simulation environment.

Distributed Ledger Technology

Cross-Industry Blockchain Technology 23

DLT Based Blockchain in Digital Currencies DLT has been closely associated with digital currencies since its invention because it was projected as the underlying technology of Bitcoin. Satoshi Nakamoto published a white paper and described the technology as “electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party” [40]. Blockchain technology for Bitcoin emerged as a solution for “double-spending” which was a challenge for the digital transformation of money. Prior to the invention of Bitcoin, a trusted central party to avoid double spending handled transaction validation. The beauty of DLT is that it protects system integrity and provides security using cryptographic solutions in a decentralized ledger that is managed by anonymous parties without having trust among themselves. The motive behind designing the Bitcoin blockchain was to create a virtual currency based on a digital platform that is beyond government control and hide network participant’s identity. Unlike HTML or HTTP, Bitcoin was an ideological project in the the start, deeply embedded in the anti-censorship ideology of the online community from which it emerged, known as “cypherpunks”, which promotes a radical strand of techno-libertarianism [41]. DLT technology has many potential applications other than digital currencies. Due to “anonymity” feature, Bitcoin has become popular among the criminals and is used for financial frauds and other illicit activities. The anonymity of transacting partners is maintained, but all Bitcoin transactions are visible to the public, which are recorded in a distributed ledger. A Bitcon transaction can be associated with a particular anonymous entity. This anonymity process is analogous to that of email address anonymity. All Bitcoin transactions contain pseudonyms which have sender's and the receiver's wallet address. Like email, transaction addresses are known but owners can remain anonymous. Many features of the Bitcoin blockchain raised an alarm for regulatory authorities and governments and had affected the cryptocurrency's reputation. There is a significant rise in ransom demand using computer malware and ransom amount demanded in the form of bitcoin for transaction anonymity. Bitcoin exchange includes lack of regulation and bitcoin's data loss problem is a major challenge. The loss of your wallet's private key can lead to loss of your entire amount in the wallet. DLT Features The centralized ledgers with role-based permissions, which can be edited by authorized participants in a network, have been in practice for a long time. The

24 Cross-Industry Blockchain Technology

Sharma and Kumar

concept of immutable and distributed ledger, was proposed through DLT. There are three key features of DLT: distributed ledger, cryptographic methodology and the consensus mechanism. DLT is not well-defined technology; instead, it is under development and its design depends on the stakeholder's requirements. Distributed Property of the Ledger The beauty and innovation in DLT is that one entity does not have control over the ledger but it is among network nodes or number of nodes, as decided. It implies that in a digital ledger, past data entries cannot be amended or new additions to the ledger cannot be approved by a single entity. To form new entries in the ledger, a consensus mechanism (decentralized in nature) is used to newly added entries to the blockchain. Post successful validation, the new transaction is amended to respective ledgers to maintain network level data consistency. This feature of the distributed ledger technology permits peer-to-peer network participants to verify and record data in their corresponding ledgers without depending on a trusted central party. The elimination of the central party requirement optimizes cost and speed by controlling efforts associated with ledger reconciliations and its maintenance. In the absence of a single attack point, it also greatly strengthens security aspects. The majority of servers in the network have to be compromised by an attacker to corrupt the ledger. Corrupting a single or part of network participants does not have any impact on the system's integrity. However, a software layer on top of the distributed ledger can be vulnerable to attack if not designed properly. Design issues in the software layer caused a significant financial damage to Mt. Gox in Japan and Bitfinex [42]. Validation using “Consensus Mechanism” Nodes in the network need unanimity for new data entries validity. Therefore, a mechanism called “consensus mechanism” is introduced in Distributed Ledger's algorithmic design. In a distributed ledger, any node can propose a new transaction addition to the ledger. It can also be a case in a distributed ledger, where only few nodes are allowed to propose an addition of a new transaction to the ledger. Utilizing cryptographic validation for a digital ledger consensus mechanism, legitimacy of a particular transaction is verified. The consensus mechanism is also useful for conflicts resolution in case of simultaneous competing entries. In case of permissionless digital ledger, consensus mechanism ensures accurate transaction sequencing and prevents bad actors take-over. Sequencing and the consensus mechanism are useful to handle double-spend problem. A concept “proof of work” is used in a global decentralized network to establish consensus. A “proof of work” protocol is must at every new block

Distributed Ledger Technology

Cross-Industry Blockchain Technology 25

addition to the chain. This is a complex challenge to solve but easy to verify. It involves heavy computing power and processing time. The proof-of-work is exercised by executing one-way cryptographic hashing algorithms (repeatedly) until a number string is produced that satisfies a predefined condition. In the case of the Bitcoin blockchain, the number contains leading zeros and the proof-o-work generation process is referred to as “mining”. It is computationally very difficult to solve this “proof-of-work” puzzle. Without costly computing resources, there is less chance for a single node in the network to generate the required proof-of-work. The Bitcoin system is designed in such a way that in every ten minutes, a valid proof-of-work is produced. The priority is given to the protocol with the higher difficulty score, that means in case two proof-of-work are generated at same time, the protocol with higher difficulty score is considered as valid. The entity “miner” receives a reward in the form of Bitcoins that produce a valid proof-of-work. This reward helps to maintain system integrity. The network security depends on the large number of nodes that are incentivized to accurately validate ledger changes and consensus establishment to maintain data consistency across the network. The “proof of work” imposes a heavy computational cost on participants for maintaining the digital ledger. It is required in the distrusted participants system. The electricity consumption by Bitcon miners is quite high. If the Bitcon network were to scale to levels like MasterCard and Visa, the electricity requirement would be more than the existing electricity consumption worldwide. This problem majorly exists in Bitcoin blockchain. Another DLT system used by Ethereum digital currency has a faster consensus mechanism and requires significantly less computational resources. In permissioned blockchain, network participants are trusted and pre-selected, therefore they do not require difficult “proof of work” as a consensus mechanism. There are other consensus mechanisms which offer seniority over computing power and require certain asset's proof of ownership for example proof-of-stake. Fig. (2) explains a centralized ledger and a distributed ledger (with and without permission). Digital Signatures and Hash Functions Every new data entry is encrypted using the hash function on the original message. It means only one hash is possible for one original input and it is impossible for another input to have the same hash [43]. A ‘transaction block’ contains this hashed transaction with a size limit [44]. Hash helps in detecting transaction data tempering as hash is computed at receiver’s end, that generates a different hash than the original hash in case of tempering. Fig. (3) explains the public key cryptography in digital signatures.

26 Cross-Industry Blockchain Technology

Sharma and Kumar

Fig. (2). Distributed ledger.

The transaction blocks are digitally signed using a digital signature. ‘Public key cryptography’ is used for digital signature in DLT. Append-only chain of ‘transaction blocks’ is formed that contains a digital message (hash digest) to be added to the ledger, a consensus mechanism output (proof-of-work), digital signature of the hash using sender’s private key, sender’s public keys and

Distributed Ledger Technology

Cross-Industry Blockchain Technology 27

intended recipients of the transaction. Fig. (4) explains a blockchain structure example: In a blockchain of 4 blocks, the last block (block 5) is added. Block 1 is the ‘genesis block’. Each block contains previous block reference to maintain chronological blocks ordering, a hashed digest transaction series and a digital signature.

Fig. (3). Digital signatures public key cryptography.

In Fig. (3), block 5 represents the newest addition to this blockchain which updates the ledger. Once a new block is added to the chain via a specified consensus mechanism, the chain cannot retroactively be changed and blocks cannot be deleted or amended without redoing the proof-of-work protocol for each block. This means that as the chain grows in length, this becomes progressively more difficult because all the nodes are constantly competing for solving proof-of-work puzzles and adding new blocks to the chain. In doing so, they only consider the transaction blockchain that reflects the greatest amount of the computational work. Each successful addition to the chain broadcasts to the entire network and all nodes have an up-to-date copy of the entire blockchain. 1. Mr. A has two keys: a public key, which he shares with the entire network, and a private key that is only known to Mr. A.

28 Cross-Industry Blockchain Technology

Sharma and Kumar

2. Mr. A uses his private key to encrypt a “hash” of the digital message, which is then propagated to the entire network. The encrypted hash is called the “digital signature”. 3. Network participants receive the digital message with a digital signature. 4. Mr. B can then use Mr. A’s public key (which he has shared with him) to validate that the digital message was encrypted with A’s private key and Mr. A is the sender of the message.

Fig. (4). Structure of blockchain.

DLT ADVANTAGES Distributed ledgers have many advantages over centralized ledgers. Advantages are listed below. No Middleman and Decentralized in Nature DLT eliminates the need for central authority and enables digital value transfer between two parties with decentralized record keeping. This saves the cost, improves scalability and speed. DLT enables automation using programming by automatically executing pre-

Distributed Ledger Technology

Cross-Industry Blockchain Technology 29

agreed conditions on some events e.g. automatic payment of invoices on arrival of shipment. In a digital ledger, the counterparties agree on the defined conditions at the completion of the transaction, and all parties have the same set of transaction records. In addition, the execution result of “smart contract” will lead to a reconciled legacy ledger system. Improved Auditability and Enhanced Transparency Each network node has a full identical copy of the encrypted distributed ledger. The changes are possible only with consensus mechanisms upon real time network propagation. This feature helps to manage reconciliation costs and reduce fraud. Perpetual and Testable DLT has an immutable/perpetual and testable transaction audit trail of any asset. Perpetuity nature of a transaction does not mean that a countervailing disputed transaction cannot be created. The original transaction record will be still available in this case. Speed and Efficiency Gain DLT optimizes efficiency and improves speed by eliminating intermediaries and by automating processes. Reducing Cost DLT eliminates the need for reconciliation and thus reduces the cost as every DLT contains the “shared truth” and there is no need to verify one “truth” with another counterparty. DLT lowers the infrastructure costs for ledger maintenance and reduces chance of fraud. Distributed ledger technology can save $15-20 billion for the financial industry [45]. Improved cybersecurity Elasticity DLT provides a more flexible system than centralized system and provides a better shield against cyber-attacks due to its distributed property and absence of a single attack point. When compared with the centralized design paradigm, DLT is an alternative design paradigm for decentralized operational model and business.

30 Cross-Industry Blockchain Technology

Sharma and Kumar

This will lead to a higher degree of automation, scalability and faster processing potential. We will understand it by comparing a centralized collateral registry with DLT based collateral registry system. In case of a centralized approach of establishing a collateral registry, a dedicated platform is set up by a central entity followed by membership criteria establishment and establishment of rules and procedures. All transactions and actions are initiated by the centralized platform. This platform is developed using standardized software development tools to address specific business requirements. In contrast, a DLT-based approach involves a collateral registry of peer-to-peer transactions with peer-defined conditions such as the release date and protocols defining rules in case of transaction failure. Based on the counter parties’ agreement, a DLT-based collateral registry system can be tailored without setting up a centralized system for a particular collateral. The role of the administrator in a DTL-based system is minimal. Business actions can be triggered without external intervention and are event-driven. As resource requirements at the administrator level are limited, setting up a DLT-based collateral registry system is faster and scalable. All participants share the processing load and collateral transactions business logic can be customized on counter parties’ requirements. DLT RISKS AND CHALLENGES The technology is emerging and many issues are to be addressed including regulatory and legal issues. There are many issues related to migrating payments, financial infrastructure and digital ledger technology. A cohesive collaboration and coordination are required for security settlement systems and central counterparties. The common challenges of DLT including regulatory, technological and legal are listed as below: Technical Issues Immature Technology DLT is still in the infant development stage and there are complex challenges about flexibility and robustness of DLT. In addition, there are concerns about volumetric transactions, supply of skilled professionals, availability of software applications and standardized hardware. However, top IT organizations and financial majors have started investing in the development of DLT products and services to provide the same confidence as existing IT systems offer.

Distributed Ledger Technology

Cross-Industry Blockchain Technology 31

Transaction Response Time and Scalability Current permissionless distributed ledgers encounter issues regarding blockchain scalability in terms of verification speed and transaction volume. Only 4-5 transactions per second are processed by Bitcoins due to the block size limit of one megabyte. The limited block size is a matter of controversy in the bitcoin community. An increased block size could be time consuming to propagate in the network and lead to forking. The Ethereum DLT system supports higher transaction throughputs. Permissioned blockchains are less transparent; more centralized but have a higher capacity to process volumetric transactions. Permissioned blockchains do not extend much benefit from open nature distributed public DLT systems. Integration and Compatibility DLT systems should integrate with existing technologies and be compatible with other ledgers. The cost of integration of DLT into the existing financial system involves huge expenses. There are frameworks under development like CORDA framework and Fabric framework to address specific industry issues in the area: ●



● ● ● ●

Allowing peer-to-peer transactions between counterparties; it is needed for counterparties’ identity validation; Need to know basis transaction visibility; it is needed for transactions access to regulators; Maintaining equivalence between original legal process and smart contracts; Interoperability between various distributed ledgers; Utilizing existing software tools; Supporting multiple consensus mechanisms.

These frameworks explore the digital ledger approaches in line with existing regulatory and industry practices. The hyperledger framework initially focuses on the financial sector and further on the supply chain, whereas the CORDA framework is used exclusively for the financial sector. Cybersecurity Research shows there are approximately 15-50 bugs in every 1000 lines of code [46]. DAO attack on Ethereum blockchain proves that any weakness in software application can be exploited for harmful effects. Distributed nature of the ledger makes network security an important aspect so that core rules of the DLT system can be safeguarded from attackers. In a type of attack called “51% attack”,

32 Cross-Industry Blockchain Technology

Sharma and Kumar

hackers take control of 51% network resources, manipulate consensus and bluff with the network. Robustness of a network depends upon its ability that no entity can take control of half of the resources for a particular blockchain. The software applications to interact with these digital ledgers need to be carefully monitored and reviewed. This can be a case when an attacker takes control of a permissionless system, has identity details and continues to take control of the majority of network participants. The recent attacks on multiple Ethereum nodes using standard Distributed Denial of Service (DDos) attacks show that the existing cyber attack techniques can be used for DLT systems. This is the point to note that even after successful attacks at the DLT access interface, the core technology of Bitcoin and other blockchain systems has never been compromised. Effective Governance Non-availability of central entity or centralized infrastructure put a question on overall effective governance of the infrastructure. It is very difficult to make critical decisions in DLT infrastructure. The financial organizations rely on a centralized regulatory for effective governance. In case of permissionless DLT, the applicability of governance arrangements is not clear. In permissioned DLT, the administrator may or may not have adequate authority and tools to ensure governance arrangements among network nodes. Legal and Regulatory Issues Industry Standards and Regulatory Evaluation Industry standards and regulatory evaluation are in the infant stage of development. Global financial regulatory is actively involved in analysis of technology but the actual regulatory DLT framework is missing. Jurisdiction and Ownership - Legal Clarity There are pointed concerns in payment and settlement systems regarding transaction's “point of finality”. It is a big question that how “point of finality” can be described in a digital ledger environment. Data and transaction jurisdiction are not defined in the cross-border digital ledger system. As there is no central administration entity for digital ledger, regulatory protocol setup is tricky and difficult for open permissionless distributed ledger systems. As there is a central

Distributed Ledger Technology

Cross-Industry Blockchain Technology 33

administrator in the permissioned ledger, regulatory framework setup and maintenance is comparatively straightforward and viable. Customer Due Diligence and Know-Your-Customer DLT systems should mandatorily follow and incorporate Customer Due Diligence (CDD) and Know-Your-Customer (KYC) practices to Combat Financial Terrorism (CFT) and to prevent Anti-Money Laundering (AML). The identity disguises property of permissionless DLT systems making it very hard to comply with existing regulatory guidelines regarding AML/CFT and permit un-vetted parties to do transactions. Some DLT exchanges promote KYC requirements by offering priority transaction time and verification if the user provides KYC information. In permissioned DLT systems, it is easy to comply with AML/CFT guidelines due to centralized control. Dispute Resolution Mechanism In case of distributed ledgers, the mechanism for dispute resolution needs to be set up; especially in case of erroneous transactions. One solution is to integrate a reverse transaction framework. In the reverse transaction framework, a separate transaction is initiated to provide permission to the original sender. For this, there is a requirement of a set of rules that can be executed in the specific circumstances to initiate reversals. Without a set of rules in place, faulty transactions could face an issues to access fund. These set of rules are administered by a central entity called scheme owner in the case of traditional systems like Visa, MasterCard etc. In case of the permissioned digital ledger, this role is handled by digital ledger administrator. In permissionless digital ledger systems, smart contracts automate the role. There are concerns related to the liabilities that may arise for losses due to digital ledger weak points. These issues can be handled effectively in the case of permissioned systems rather than permissionless systems. Privacy The identity of the user is not exposed in case of permissionless ledgers like Ethereum and Bitcoin. In some cases, the user's identity can be inferred on the basis of some markers like transaction patterns. The issue is same as in the case of a permissioned digital ledger. This is the major challenge in applying digital ledger technology to financial infrastructures and many organizations are working on its design.

34 Cross-Industry Blockchain Technology

Sharma and Kumar

Infrastructure Cost Utilizing consensus mechanism and proof-of-work need enormous computational resources/infrastructure, which leads to huge power consumption for mining. DLT APPLICATIONS There are many applications of the digital ledger technology in wide variety of industries including financial sector. Two potential areas of DLT applications are: 1) Fintech companies are exploring to utilize blockchain infrastructure to develop digital applications for multipurpose use; and 2) industry leaders are investing on research, to develop proprietary permissioned blockchain and address the need of enterprise solutions specific to industry. There is a huge interest of financial sector in DLT and its proof of concept. “Hyperledger” - an open source consortium has more than 170 organization as its member; and “R3CEV”- blockchain R&D organization for financial sector, has more than 100 members including commercial banks, regulators and other trade associations [47]. Stock exchanges including NASDAQ, NYSE and LSE are exploring DLT to improve security in transactions [48]. DLT has the ability to transform the every stocked are traded and issued the potential to replace existing stock exchanges systems. ●











IBM and The Tokyo Stock Exchange are exploring blockchain for trade monitoring and recording in low-transaction markets. The US Security Exchange approved a plan to issue overstock company stocks using the Bitcoin blockchain in 2015 [49]. ”Deutsche Borse” - Germany's stock exchange and central bank develops a blockchain framework for digital asset trading [50]. A blockchain-backed market is launched by Korea Exchange KRX for startups equity shares. This is named as Korea Startup Market (KSM) in association with a Korean startup “Blocko” [51]. A startup organization “Digital Asset Holdings” and The Australian Stock Exchange are testing DLT to optimize clearing and settlement processes. A blockchain-based system is developed for credit fraud in the post-trade processing mode. This has been developed by three technologies organizations IBM and two blockchain startups - R3 and Axoni [52].

DLT AND FINANCIAL INCLUSION DLT has capabilities to improve resilience, reliability and efficiencies for the financial sector and its infrastructures. Despite strong expansion of financial

Distributed Ledger Technology

Cross-Industry Blockchain Technology 35

inclusion, there are challenges to bring excluded communities into the financial system. The benefit of DLT systems are likely to be harnessed by financial institutions and fintech organizations. DLT has potential to enhance financial inclusion by addressing following financial issues: ● ● ● ● ●

Half-baked security framework for transactions and collateral securities. Reasonable financial services. Lack of due diligence requirements including KYC verifiable identity systems. Poor credit and payment infrastructure. International remittances de-risking impact.

Application of DLT for improved financial inclusion: ● ● ● ●

Asset Registries Cross-border remittances Digital currencies Digital ID systems

CROSS BORDER REMITTANCE AND PAYMENT Cross border payments are generally conducted by a network of correspondent banks and involve long delays, high costs and uncertainty. These transactions involve multi point transaction fees and are restricted to the bank's business hours. The fee involved fees charged for cross-border transfer (correspondent banks and other intermediately organizations involved in payment infrastructure), fees charged by receiving institutions and by sending institutions. Non-banking institutions have their proprietary frameworks in place, that involveprefunding at receiving institutions to settle periodic aggregated amounts and to enable faster disbursement. There is a huge improvement in cross border remittance due to the collaboration and tie-up between financial institutions, matured systems and high-level optimizations for the processes. However, there is not much innovation involved in it and the service fees continue to be a big portion i.e. 20% of the total cost [53]. DLT can replace correspondent banking systems and can eliminate inefficiency in the existing system by offering cost reduction in interbank cross-border transactions. DLT can help to bring down remittance prices further by increasing inter-bank and cross-border transfers efficiency and by lowering settlement costs. DLT can open doors for new approach to the correspondent banking system, which can further address derisking issues. Some of the examples are listed below:

36 Cross-Industry Blockchain Technology

Sharma and Kumar

Ripple Ripple focuses on cross-currency fund settlement combined with cross border commercial payments. Ripple uses a unique approach that involved “path” identification for sender's fund flow in a particular currency to receiver’s particular currency utilizing services (for that currency), offered by a series of participant institutions. This can expand access to foreign exchange services for micro remittances companies and discover better price for foreign exchange. XRP is Ripple's own cryptocurrency, which is registered to trade on many cryptocurrency exchanges. Ripple has its own exchange that involves the exchange of top currencies like EUR, USD, CNY and JPY. The exchange is actively done other than cryptocurrencies like ether and Bitcoin. The Shanghai Huarui bank announced to use Ripple for its remittance product on the USAChina network [54]. Abra Abra combines physical bank tellers with cryptocurrency and offers instant money transfer without transaction fee in peer-to-peer mode. In Abra, no bank account is required for cross border payment; recipient's phone number is the only requirement. In addition to Bitcon, Abra supports over 50 currencies globally. Bitpesa It offers cross-border payment for individual and businesses between China and some African countries like Kenya, Nigeria, Tanzania, Uganda [55]. Bitt It is Caribbean's based bitcoin exchange organization, that focuses on creating a unified payment settlement network for CARICOM region. SMART CONTRACTS In the context of DLT, 'Smart contracts' are programs that automatically executed by network nodes and developed on the underlying distributed ledger. A smart contract can execute any instruction that a computer could execute. Smart contracts are triggered by transactions on the distributed ledger and the resultant is stored in the ledger. Smart contracts “allow for logic to be programmed on top of the blockchain transaction” [56]. Digital ledgers that are not blockchain can execute smart contracts. Same data must be available to all network nodes, thus each node should verify smart contracts.

Distributed Ledger Technology

Cross-Industry Blockchain Technology 37

Smart contract was first coined in 1997 by Nick Szabo where he takes vending machines to explain the idea of a smart contract [57]. The vending machine manages asset ownership and transfers the ownership of asset on coin insert. The vending machine ensures the 'contract' term to be followed that defines conditions, the underlying assets, its inputs and subsequent actions. Security sales or purchase at a predefined price would be automatically executed by a computer program. Applications of smart contracts could be mergers and acquisitions, derivatives markets and in security transactions. DLT system enables a platform for smart contracts to control real-world assets like share, land title etc. without third party requirement such as a land title administrator or a broker. This can be possible because the distributed network nodes are capable of executing code and contract enforcement. Fig. (5) explains the utilization of smart contracts in trade finance. A similar DLT-based methodology can be applied to other domains such as collateral registry or mortgage process.

Fig. (5). Trade finance smart contract. (ING/Wall Street Journal – “Banks Turn to Virtual World to Modernize Physical Commodities Trading”, By Stephanie Young, 04 Apr 2017, Wall Street Journal https://www.wsj.com/articles/banks- turn-to-virtual-world-to-modernize-physical-commodities-trading-1491 303623)

38 Cross-Industry Blockchain Technology

Sharma and Kumar

Smart contracts have attracted businessmen because they facilitate the idea of automated organizations that do not depend on any human inputs except financial backing personnel. Among the world's biggest public blockchain, Ethereum is a well optimized for smart contract applications. Venture capital funds for automated businesses have been launched on the Ethereum platform by Decentralized Autonomous Organizations (DAOs). The working of DAO's is as: ● ●

● ●

Smart contracts are formulated by a group of people to run the organization. People provide funds (in an initial funding period) to DAO to represent ownership by purchasing tokens. This is referred as initial coin offering (ICO) or crowd sale. It enables organizations to set up required resources. Post funding period, DAO starts to operate. People can suggest DAO to invest the money and members have the right to vote for approval/rejection [58].

The DAO entity “Ethereum” system was attacked in June 2016. In the attack, the intruder transferred 3.5 million “ether” cryptocurrency (valued around US$50). The intruder identified an exploit bug in the DAO software but the base Ethereum blockchain was not compromised. This attack is an instance of security vulnerability, that exists on the application layer on top of the blockchain. To recover the stolen funds, the Ethereum community decided to complete “hard fork” for Ethereum blockchain. Ethereum blockchain was divided into two active cryptocurrencies called Ether/Ethereum One/Ethereum Core and Ethereum Classic. The first one contains the restored stolen funds hard fork and the later contains stolen funds original transaction under hacker's control. The use of DLT combined with automated smart contracts raise a number of regulatory and legal issues in addition to technical vulnerabilities. These issues are related to jurisdiction, liability, voidability and amendments of contracts. EXPERIMENT PRACTICES Best practices are discussed in this section including approaches adopted by banks for their central bank digital currency initiatives. Project Jasper The project was launched by the Bank of Canada, Payments Canada, a few other Canadian organizations and a blockchain organization R3 in March 2016 [59].

Distributed Ledger Technology

Cross-Industry Blockchain Technology 39

Phase I Phase I of JASPER was launched in March 2016 and aimed to build proof of concept based on DLT technology for interbank settlements [16]. For each participating Ethereum entity, distributed nodes were created. Bank of Canada approves or rejects transaction using smart contracts based on autonomous transaction agents. Every Jasper Phase I transactions were synchronized and updated on every node [60]. Phase II To fix the issues of Jasper Phase I, Phase II was introduced in September 2016 to explore and recreate Jasper Phase I prototype on a different DLT platform. Phase II of Jasper was developed on Corda. Phase II of Jasper introduced two more participants in addition to the Phase I participants. In contrast to Jasper phase I implementation, Phase II implemented a liquidity-savings mechanism (LSM) and an atomic settlement capability based on Corda. Phase II of Jasper has backward compatibility to support Phase I support including deferred and atomic net settlement options. Phase III In October 2017, Phase III of Jasper was initiated by the Bank of Canada to harness DLT features for multiple asset type exchanges . Organizations participating in Jasper Phase III were the Bank of Canada, TMX Group, Payments Canada, R3 and Accenture. TMX is a financial organization in Canada which works for many security exchanges and is the owner of Canadian Depository for Securities [61]. The CDS is the settlement hub and national clearing center for securities depositories in Canada [62, 63]. The aim of Jasper Phase III was to develop a proof of concept based on DLT, that permits multiple asset types to be exchanged on shared ledger. Jasper Phase III enables tokenized financial assets and atomic settlement capabilities on an integrated platform. The prototype was hosted on Microsoft cloud and implemented on Corda v2.0. Project BLOCKBASTER Project BLOCKBASTER was started in March 2016 by Deutsche Borse Group and Deutsche undesbank after motivated by technology capability in the financial services industry [64]. The project goal was to harness blockchain to improve Germany's security

40 Cross-Industry Blockchain Technology

Sharma and Kumar

settlement FMI back office services. Central bank of Germany is Deutsche Bundesbank [65] and is one of the world's biggest securities exchange centers [66]. It manages and operates a clearing house “Clearstream”, based in Luxembourg. The BLOCKBASTER was initiated to develop a prototype based on DLT for cash securities settlement. The project BLOCKBASTER used two digital ledger platforms named Hyperledger Fabric and Digital Assets to implement lifecycle management prototype and a full interbank bond issuance. Cash assets and tokenized bond were securities settled on project BLOCKBASTER. The project BLOCKBASTER was restricted to settlement based on DLT that matched cash or securities trades only to enable applicability assessment of DLT and rapid prototyping. Banks interest rate payment capabilities were built in BLOCKBASTER project. Market making, bond pricing and LSM settlement capabilities were not in scope for BLOCKBASTER project. Project SALT Project SALT was started in September 2016 by The Banco Central do Brazil with the motive to explore DLT use cases for central banks. Four use cases were identified to select one of them to implement. The system identified was the Alternative System for Transaction Settlement (SALT) as standby system for Brazil's RTGS system based on multiple DLT platforms. First phase of project SALT was to implement proof of concept on an Ethereum fork system in sixty days startedin September 2016 [67]. In Phase II of SALT, it was implemented on Quorum and Fabric in a period of forty five days started in January 2017 [67]. In addition to this, tokenized Brazilian Real (BRL) central bank digital currency asset was implemented by Project SALT. Project UBIN Project Ubin was started in November 2016 and implemented by Singaporean PSPs, MAS and industry collaboration. It was an initiative for Singapore's Central Bank Digital Currency to explore DLT and its applicability in Singapore financial market infrastructure [68]. MAS is the financial regulatory and central bank of Singapore. MAS manages and controls MAS Electronic Payment System (MEPSC) and Singapore's RTGS system. MEPSC is a type of financial market infrastructure used for Scriptless Singapore Government Securities (SGS) and Singapore domestic wholesale interbank payment settlement for MEPSC members [69]. Phase I of Ubin implemented a central bank digital currency based on Ethereum DLT platform for domestic wholesale interbank payment settlement [69]. Phase II enhances Phase I with additional features on Quorum, Fabric and Corda to address settlement functionality and data privacy challenges that

Distributed Ledger Technology

Cross-Industry Blockchain Technology 41

occurred in Phase I [70]. Phase III of Ubin developed DvP capabilities for interbank payment settlement and security on different DLT platforms. The end goal of project Ubin was to provide capabilities for SGD depository receipt or tokenized Singapore Dollar on digital ledger technology and to analyze the impact on Singapore financial market infrastructures. Project Stella The ECB and the Bank of Japan started project Stella to analyze the feasibility of DLT to financial market infrastructure in both jurisdictions [71]. Eurozone monetary policies are administered by the ECB. In the Eurozone, the TARGET2 system (settlement system for high value interbank transactions) is in use for monetary policy operations [72]. TARGET2 system is owned and operated by the Eurosystem, that comprises National central banks of European Union Member States and the ECB [73]. Monetary policy in Japan is administered by The Bank of Japan, Japan's central bank. It manages Japan's wholesale LVTS, and BOJNET. Project Stella uses multiple DLT platforms and has been implemented in three phases. In Phase I, core RTGS functionality and Central Bank Digital Currency was implemented on Fabric DLT platform. DvP functionality for tokenized security settlement on Corda, Fabric and Elements were implemented in Project Stella Phase II [74]. Phase III of Project Stella aimed at improving cross border transactions efficiency using DLT [75]. Fabric DLT platform was used to implement Project Stella. Project Khokha Project Khokha was started in January 2018 by PricewaterhouseCoopers, the SARB, ConsenSys and seven South African CMBs to utilize DLT for South Africa wholesale interbank payments settlement domestically [76]. The aim of Project Khokha was to establish a DLT driven RTGS system using tokenized Rand assets for interbank payment settlement in South Africa. The Quorum DLT platform was used for its prototype. In South Africa, the RTGS system is referred to as South African Multiple Option Settlement System (SAMOS). SARB owns and manages SAMOS are used for interbank retail payment obligations, highvalue interbank payments and South African security settlement. SAMOS has capability to process approx. 70,000 transactions (wholesale interbank) daily on RTGS framework with capacity to process daily transactions in two hours in case of system failure and emergency operations [76].

42 Cross-Industry Blockchain Technology

Sharma and Kumar

Project INTHANON The Bank of Thailand in collaboration with R3 and other organizations started Project Inthanon in August 2018 to evaluate the DLT capabilities for Thailand's financial market infrastructures [34]. Project Inthanon was divided into two phases. Phase I of Inthanon developed a RTGS prototype based on DLT-based distribution targeting Thailand's domestic wholesale interbank payment settlement [34]. In Phase II of project Inthanon, development of a securities settlement platform for the management, for the issuance and settlement of Bank of Thailand issued tokenized cash assets and tokenized bonds. SUMMARY This chapter explained Distributed Ledger Technology (DLT) and its application in the financial sector. The chapter detailed blockchain based Digital Ledger Technology and its working. The existing works have been studied and analyzed for harnessing digital ledger technology in the banking and finance sector. Digital currencies recommended by central banks are studied for better understanding and its applicability. The working of distributed ledger technology in the context of financial services has been discussed. DLT advantages, risks and challenges have been explored. Detailed analysis of DLT potential applications including financial inclusion, cross border remittance and payments, smart contracts has been elaborated. Current DLT practices in banking and financial domains have been highlighted. In the nutshell, the chapter explains every aspect of DLT with respect to the financial domain for better understanding and its applicability in banking and financial domain. CONSENT FOR PUBLICATION Not applicable. CONFLICT OF INTEREST The authors declare no conflict of interest, financial or otherwise. ACKNOWLEDGEMENT Declared none. REFERENCES [1]

K. Lien, The Major Central Banks. https://www.investopedia.com/articles/forex/06/centralbanks.asp

[2]

T. Segal, C. Potters, and S. Kvilhaug, "What Is a Central Bank, and Does the U.S. Have One?", https://www.investopedia.com/terms/c/centralbank.asp

[3]

S. Nakamoto, "Bitcoin v0.1 released", https://www.metzdowd.com/pipermail/cryptography/2009-

Distributed Ledger Technology

Cross-Industry Blockchain Technology 43

January/014994.html [4]

Coin Market Cap. Cryptocurrency https://coinmarketcap.com/

Market

Capitalization.

Accessed:

Nov.

[5]

D. Mazieres, The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus. https://www.stellar.org/papers/stellar-consensus-protocol.pdf

[6]

D. Schwartz, N. Youngs, and A. Britto, The Ripple Protocol Consensus Algorithm., 2014. http://www.cs.yale.edu/homes/jf/Schwartz.pdf

[7]

V. Buterin, Ethereum White Paper: A Next-Generation Smart Contract and Decentralized Application Platform., 2015.https://github.com/ethereum/wiki/wiki/White-Paper

[8]

Tether Ltd. Tether: Fiat Currencies on the https://tether.to/wpcontent/uploads/2016/06/TetherWhitePaper.pdf

[9]

B.S.C. Fung, and H. Halaburda, Central Bank Digital Currencies: A Framework for Assessing Why and How. Bank of Canada: Ottawa, ON, Canada, 2016. https://www.bankofcanada.ca/wpcontent/ uploads/2016/11/sdp2016-22.pdf

[10]

World Economic Forum, https://docs.google.com/document/d/1c8iGtoG7BkPr-iufnIPELEWvtZi NtouOyJp2IYjhAEY/edit

[11]

C. Barontini, and H. Holden, "Proceeding With Cautiona Survey on Central Bank Digital Currency", Bank for International Settlement, 2019.https://www.bis.org/publ/bppdf/bispap101.pdf

[12]

Bank of England, One Bank Research Agenda., 2015. https://www.bitcoinnews.ch/wpcontent/uploads/2013/12/discussion.pdf

[13]

G. Danezis, and S. Meiklejohn, "Centrally banked cryptocurrencies", Proc. Netw. Distrib. Syst. Secur. Symp., 2016p. 114 San Diego, CA, USA

[14]

People’s Bank of China, "Digital Currency Symposium Held in Beijing", http://www.pbc. gov.cn/goutongjiaoliu/113456/113469/3008070/index.html

[15]

N. Varshney, "People’s bank of china plans to launch its own digital currency", https://cointelegraph.com/news/peoples-bank-of-china-plansto-launch-its-own-digital-currency

[16]

Payments Canada, Bank of Canada and R3., 2017. https://www.payments.ca/sites/default/les/29-Se-17/jasper_report_eng.pdf

[17]

SUPCACVEN, https://whitepaperdatabase.com/venezuela-petro-cryptocurrency-ptrenglish-whitepap er/

[18]

D. Mills, K. Wang, B. Malone, A. Ravi, J. Marquardt, C. Chen, A. Badev, A. Badev, T. Brezinski, L. Fahy, K. Liao, V. Kargenian, M. Ellithorpe, W. Ng, and M. Baird, "Distributed Ledger Technology in Payments, Clearing, and Settlement", In: Finance and Economics Discussion Series 2016-095. Board of Governors of the Federal Reserve System: Washington, DC, USA, 2016. [http://dx.doi.org/10.17016/FEDS.2016.095]

[19]

European Central Bank and Bank of Japan, https://www.boj.or.jp/ en/announcements/release_2019/ data/rel190604a2.pdf

[20]

Hong Kong Monetary Authority, Welcome Speech at the Best Fintech Awards, 2017. https://www.hkma.gov.hk/chi/news-and-media/speeches/2017/03/20170327-1/

[21]

Hong Kong Legislative Council Commission, Development of Financial Technologies., 2017. https://www.legco.gov.hk/yr1617/english/panels/fa/papers/fa20170418cb1-777-3-e.pdf

[22]

A. Grym, P. Heikkinen, K. Kauko, and K. Takala, Central Bank Digital Currency., 2017. https://pdfs.semanticscholar.org/9fa6/e095fa409d199e7aec8b50b657a7075fbe9e.pdf

[23]

S. Riksbank, The Riksbank's e-Krona Project (Report 1). Stockholm, 2017, https://www.riksbank. se/globalassets/media/rapporter/ekrona/2017/rapport_ekrona_ uppdaterad_170920_eng.pdf

Bitcoin

15,

2019.

Blockchain,

44 Cross-Industry Blockchain Technology

Sharma and Kumar

[24]

S. Riksbank, and S. Stockholm, The Riksbank's e-Krona Project (Report 2), 2018, https://www.riksbank.se/globalassets/media/rapporter/e-krona/2018/the-riksbanks-e-krona projectreport-2.pdf

[25]

G. Licandro, Uruguayan e-Peso on the Context of Financial Inclusion, Central Bank Uruguay, Montevideo, Uruguay, Nov. 2018.de-france-blockchain-project.

[26]

D. Nationalbank, Central bank digital currency in Denmark?. http://www.nationalbanken.dk/ en/publications/Documents/2017/12/Analysis%20%20Central%20bank%20digital%20currency%20in%20Denmark.pdf

[27]

A. Jazeera, What is Venezuela’s New Petro Cryptocurrency?. https://www.aljazeera.com/news/ 2018/02/venezuela-petro-cryptocurrency-180219065112440.html

[28]

Bank of Lithuania, Pre-Commercial Procurement. https://www.lb.lt/en/pre-commercialprocurement

[29]

Bank of Lithuania, https://www.lb.lt/en/news/lbchain-project-six-nancial-products-already-beingtested

[30]

Bank of Lithuania, Bank of Lithuania Calls for Proposals to Develop a Blockchain Platform., 2018. https://www.lb.lt/en/news/bank-of-lithuania-calls-for-proposals-todevelop-a-blockchain-platform

[31]

A.M. Maechler, https://www.snb.ch/en/mmr/speeches/id/ref_20180405_amr/source/ref_20180405 _amr.en.pdf

[32]

Norges Bank, "Central bank digital currencies. Norges Bank Papers 1/2018", Available: https://static.norgesbank.no/contentassets/166efadb3d73419c8c50f9471be26402/nbpapers12018centra lbankdigitalcurrencies.pdf?v=05/18/2018121950&ft=.pdf

[33]

G. Bascand, "In search of gold: Exploring central bank issued digital currency", The Point Conf, 2018p. 110

[34]

Bank of Thailand, "Project Inthanon Phase 1", Available: Systems/Documents/Inthanon_Phase1 _Report.pdf

[35]

Y. S. Kim, and O. Kwon, "Central bank digital currency and financial stability", Bank Korea, Seoul, South Korea, BOKWorking Paper, 2019. [http://dx.doi.org/10.2139/ssrn.3330914]

[36]

N. Yanagawa, and H. Yamaoka, "Digital innovation, data revolution, and central bank digital currency", Bank Japan, Tokyo, Japan, Working Paper Series 19-E-2., 2019.

[37]

Bank of Canada and Monetary Authority of Singapore, Jasper-Ubin Design Paper: Enabling CrossBorder High Value Transfer Using Distributed Ledger Technologies. Accessed: https://www.mas.gov.sg/-/media/Jasper-Ubin-Design-Paper.pdf

[38]

Monetary Authority of Singapore, https://www.mas.gov.sg/schemes-and-initiatives/Project-Ubin

[39]

European Central Bank, https://www.ecb.europa.eu/pub/pdf/scpops/ecb.op223~3ce14e986c.en.pdf

[40]

S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", https://bitcoin.org/bitcoin.pdf

[41]

A. Chen, "We need to know who Satoshi Nakamoto is The New Yorker, 09 May 2016", http://www.newyorker.com/ business/currency/we-need-toknow-who-satoshi-nakamoto-is

[42]

European Central Bank, "Virtual Currency Schemes", https://www.ecb.europa.eu/pub/pdf/other/ virtualcurrency schemes201210en.pdf

[43]

S. Nakamoto, Bitcoin v0.1 Released. Accessed: Oct. 7, 2018. https://www.metzdowd.com/ pipermail/cryptography/2009- January/014994.html

[44]

Coin Market Cap. Cryptocurrency Market Capitalization. Accessed: Nov. 15, 2019. CoinMarket Cap. Available: https://coinmarketcap.com/

[45]

V. Buterin, Ethereum White Paper: A Next-Generation Smart Contract and Decentralized Application Platform. Accessed: https://github.com/ethereum/wiki/wiki/White-Paper

https://www.bot.or.th/Thai/Payment

Available:

Distributed Ledger Technology

Cross-Industry Blockchain Technology 45

[46]

D. Schwartz, N. Youngs, and A. Britto, The Ripple Protocol Consensus Algorithm. Ripple Labs. Available: http://www.cs.yale.edu/homes/jf/Schwartz.pdf

[47]

CoinDesk, State of Block Chain, Q3 2016.

[48]

http://www.coindesk.com/10-stock-exchangesblockchain/

[49]

http://www.wired.com/2015/12/sec-approvesplan-to-issue-company-stock-via-the-bitcoinblockchain/

[50]

http://www.coindesk.com/german-central-bankblockchain-trading/

[51]

http://www.coindesk.com/korea-exchangelaunches-blockchain-powered-private-marketservice/

[52]

http://www.forbes.com/sites/laurashin/2017/01/09/dtcc-selects-partnersfor-blockchain-solution-for-cre dit-defaultswaps/#1ebe0994ad88

[53]

Based on analysis of the remittance prices recorded at World Bank remittances price database remittanceprices.worldbank.org across a range of corridors.

[54]

https://ripple.com/insights/several-global-banksjoin-ripples-growing-network/

[55]

https://www.bitpesa.co/blog/connectingpayments-with-africa-and-china/

[56]

Autonomous Research LLP, Block chain: backoffice autonomous.com/fintech/d9335db1-bf1a-4ab2-8d1d-a36cb747a6ae

[57]

N. Szabo, "The idea of smart contracts", http://szabo.best.vwh.net/smart_contracts_idea.html

[58]

CoinDesk, "Understanding The DAO Attack", https://www.coindesk.com/understanding-da-hackjournalists/

[59]

R3, The R3 Story. Accessed: Mar. 15, 2019. Available: https://www.r3.com/about/

[60]

Payments Canada, the Bank of Canada, TMX Group, Accenture and R3. Jasper Phase III: Securities Settlement Using Distributed Ledger Technology,

[61]

TMX Group, TMX Group Companies. https://www.tmx.com/tmx-group/tmx-group-companies

[62]

J. Chen, Canadian Depository For Securities Limited (CDS). https://www.investopedia.com/terms/c/canadian-depository-for-securities-limited.asp

[63]

TMX Group, "The canadian depository for securities", Available: https://www.cds.ca/

[64]

BLOCKBASTER. Deutsche Bundesbank https://www.bundesbank.de/en/press/press-releases/

[65]

Deutsche Börse Group, "Deutsche Börse group company prole", https://www.deutscheboerse. com/dbg-en/our-company/deutsche-boerse-group

[66]

Deutsche Bundesbank, organisation

[67]

Central Bank of Brazil, Distributed ledger technical research in Central Brazil..https://www.bcb.gov.br/htms/public/microcredito/Distributed_ledge_technical _research_in_Central_Bank_of_Brazil.pdf

[68]

Monetary Authority of Singapore, Project Ubin: Central Bank Digital Money Using Distributed Ledger Technology. Available: https://www.mas.gov.sg/schemes-and-initiatives/Project-Ubin

[69]

Monetary Authority of Singapore, Project Ubin: SGD on Distributed Ledger. Accessed: https://www.mas.gov.sg/-/media/MAS/ProjectUbin/Project-UbinSGD-on-Distributed- Ledger.pdf

[70]

Monetary Authority of Singapore, Project Ubin Phase 2 Report: Re-Imagining RTGS. Accessed: Jul. 8, 2018. Available: https://www.mas.gov.sg/-/media/MAS/ProjectUbin/Project-UbinSGDn-Distributed-Ledger.pdf

[71]

European

Central

Organization.

Bank

and

Bank

Accessed:

of

Japan,

and

block

Deutsche

buster.

https://www.

Investopedia.

Börse

Group,

https://www.bundesbank.de/en/bundesbank/ Bank

of

https://www.ecb.europa.eu/pub/pdf/other/

46 Cross-Industry Blockchain Technology

Sharma and Kumar

ecb.stella_project_report_september_2017.pdf [72]

European Central Bank, TARGET2. Accessed: https://www.ecb.europa.eu/paym/target/target2/ html/index.en.html

[73]

Monetary Authority of Singapore, Delivery versus Payment on DLT. Accessed: https://www.mas.gov.sg/-/media/MAS/ProjectUbin/Project-Ubin-DvP-on-Distributed LedgerTechnologies.pdf?la=en&hash=2ADD9093B64A819FCC78D94E68FA008A6CD724FF

[74]

European Central Bank and Bank of Japan, Securities Settlement Systems: Delivery-versus-Payment in a Distributed Ledger Environment. https://www.boj.or.jp/en/announcements/release_2018/ data/rel180327a1.pdf

[75]

European Central Bank and Bank of Japan, Synchronised Cross-BorderPayments. ECB and Bank of Japan. Available: https://www.ecb.europa.eu/paym/intro/publications/pdf/ecb.miptopical 190604.en.pdf

[76]

Bank of Thailand, Project Inthanon Phase II. https://www.bot.or.th/English/Financial Markets/ ProjectInthanon/Documents/Inthanon_Phase2_Report.pdf

Cross-Industry Blockchain Technology, 2022, 47-73

47

CHAPTER 3

Implementation of Blockchain Technology for Big Data Yasir Afaq1, Shaik Vaseem Akram2,*, Rajesh Singh2 and Mohammad Shafiq3 Lovely Professional University, Phagwara, Punjab, India Uttaranchal University, Dehradun, India 3 Department of Cyberspace, Institute of Advanced Technology, GuangZhou University, Guangzhou, China 1 2

Abstract: The focus of this chapter is to provide brief knowledge about the concept and advantages of integrating Big Data and blockchain technology. As we are focusing on the blockchain and Big Data, it is suitable to introduce Big Data before exploring its interactions with blockchain. The blockchain technology is introduced and then the interaction between blockchain technology and Big Data is focused, in order to gain a clear understanding of how blockchain technology is used for Big Data. Thereafter, the different applications of blockchain and Big Data are explored.

Keywords: Big Data, Big Data analytics, Blockchain. INTRODUCTION The invention of technology led to a period of important revolutionary reforms. The present era is continuously shifting towards the technology and the environment both. The information systems (IT) environment should therefore adopt research and application strategies to deal with future changes regardless of the circumstances and pace of the transformation. The latest IT developments can be summed up as large flows, such as blockchain, machine learning, and Big Data. Blockchain is a processing system for data exchange that distributes and preserves all data handled by network active participants. Blockchain, Cryptocurrency and Big Data are three major areas of the digital world-disrupting, intense passion, and challenging business strategies and activities around the planet. Since its introduction, the advent of Big Data has created various challenges and opportunities, by turning data into a quality source. Moreover, blockchain technology itself is being examined as a possible basis for making business processes more profitable and efficient. The blockchain is tech* Corresponding author Shaik Vaseem Akram: Uttaranchal University, Dehradun, India; E-mail: [email protected]

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

48 Cross-Industry Blockchain Technology

Afaq et al.

nically a public distributed ledger that contains all the transactions performed in the program. This is available on a P2P network, where a copy of the blockchain ledger is stored on every complete node. No central authority is responsible for managing the blockchain database. This concept of getting a database only between the system's actual and equal users sets the strategy for creating the socalled: “decentralized loyalty” [1]. Blockchain has the features of decentralization, non-tamper ability and fully programmable that can definitely deal with the security problems of Big Data storage, in particular for the safety of personal information that has a huge amount of secret information, and must be controlled and supported by government and large corporations [2 - 4]. The blockchain consists of many data blocks connected together in the sequence of incubation period, and the block size can be created by the consensus protocol of each node, and protection is guaranteed by the encryption technology. If a node tries to mess with a block, it is difficult to imagine the block to the entire network through the consensus process [5]. The operating history of each block can be traced by Markel tree and time stamp [6]. CATEGORIES OF BLOCKCHAIN Blockchains are categorized into three types by methods of entry, namely, Public Blockchain, Private Blockchain and Blockchain Consortium [7, 9]. The Public Blockchain is the blockchain that is the first and perhaps most extensively used. Bitcoin is a community blockchain agent. The characteristics are decentralization and not being governed or regulated by any organization. Anyone can access the Public Blockchain [8]. The Private Blockchain is a framework not available to the outside community and is only used by the organization [10]. The Blockchain Consortium is between the Private Blockchain and the Public Blockchain and is normally used in areas where multiple users work, such as businesses, states, and banks at the same time [11]. Fig. (1) includes the different categories of blockchain. Table 1 gives a description of public, private and federated blockchains in terms of access permission, transaction speed, performance, protection, immutability, consensus mechanism, network and asset. Generation of Blockchain While, blockchain has already seen three generations, but that does not mean any subsequent generation was more popular than the previous generation. Interestingly, in the highly overlapped space, all three generations continue to develop and build their own place in the industry and are attempting to emerge as

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 49

winners. Different factors can decide, which generation has the best possible opportunity. The three generations of block chain are discussed in Fig. (2).

Fig. (1). Different Categories of blockchain [9].

Fig. (2). Generation of blockchain

Blockchain 1.0 Each transaction is stored in the distributed ledger form in this process, so that it is open to any member in the distributed network. Bitcoin is the first digital decentralized currency, and a blockchain 1.0 technology. The fundamental technologies of Bitcoin are mining, cryptography, and the crowd ledger. A miner is an individual in this century who inquires block by figuring out the mathematical problem and gets a 12.5-Bitcoin as a reward for block verification. Security of own identity, money control, quick and automatic transaction are the characteristics of blockchain 1.0. Blockchain 2.0

50 Cross-Industry Blockchain Technology

Afaq et al.

The Blockchain technology of the second generation (Blockchain 2.0) is the digital economy. While the concept of a digital economy was implemented 20 years ago, the focus is on gaining from the digital economy for its complete implementation. A smart contract is a series of guidelines between two entities for building the digital contract. Ethereum is the one smart contracting network running on [12]. Blockchain 3.0 To the interest of two generations of blockchain, they contribute primarily to the sectors of manufacturing, commerce, and finance. Systems including healthcare, medical records [12] resource management, supply chain, authentication, smart city, electricity industry and system management are now a blockchain 3.0 organization. Significance of Blockchain Technology and Decentralization and its Effect Security The digital world is filled with hackers, searching for outlets to breach details or steal data. The files contained in blockchain technology have robust protection that makes it impossible for one to hack. Transparency Since, everything is shown on the network, there are very less chances that any difference may be produced. Inexpensive Most of the conventional financial structures available in the market are costly, but blockchain is cheaper. Transaction Time A person can send and receive activities and valuable documents within a few minutes that minimizes the pressure of waiting for hours. Financial Efficiency Decentralized blockchain allows one to make individual transaction without a third party intervention, unlike conventional banks that consumed lot of time for making transactions.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 51

Protect Business from Frauds The blockchain is open-source ledgers that is why it is very easy to determine how fraud has occurred, because all transactions are registered on them. Applications of Blockchain Technology From the past few years, blockchain is used in different areas and it shows a better result. Some of the applications in which blockchain technology is used are as follows-. Health Care The feature of blockchain technology, such as the infallibility of the data held in a database, attracted the healthcare sector's attention, and for many possible situations, rosy possibilities are being addressed. Blockchain technology is bound to enhance the management of medical records and the insurance claim process, speed up biological and preclinical science and update data on biomedicine and health care [13]. These standards are focused on key aspects of blockchain technology such as decentralization, unchanging audit trail, data provenance, robustness, and enhanced protection and privacy. After addressing many possibilities, the most important breakthrough that can be accomplished through blockchain technology is the preservation of the right of data subjects. Fig. (3). illustrates the transaction of healthcare in blockchain. The collection, and use of medical data by data subjects other than hospitals should be permitted. This is a central principle of patient-centered interoperability that differs from traditional interoperability guided by organization. In addition to technology-related problems, there are many concerns from patient-centered interoperability, such as data quality, security and privacy. This is a central principle of patient-centered interoperability that differs from traditional interoperability guided by organization. In addition to technologyrelated problems, there are many concerns related to patient-centered interoperability, such as data quality, security and privacy. Blockchain technology makes the transition simpler from hierarchical standardization to patient-centered interoperability [14]. Blockchain allows patients to grant access rules for their medical data, allowing different investigators, for example to access sections of their data for a limited time span. Blockchain technology is continually evolving rather than finishing, and it has many possible obstacles that need to be resolved for biomedical and healthcare applications to be implemented. The first challenge concerns confidentiality and accountability. On a blockchain network, almost everyone can see everything. Some assume that health records are kept off-chain and that in a blockchain, just the hash of the tag information is retained. The

52 Cross-Industry Blockchain Technology

Afaq et al.

second problem has to do with pace and scalability. In a proof-of-concept test, transaction processing speed, such as credit or debit card, is anticipated to be just a few thousandths of the traditional way. Given that the number of transactions in the healthcare industry is immense, a breakthrough in blockchain technology is expected. The last challenge is the 51 per cent possibility of an assault. It is a theoretical, yet plausible risk and a simple solution should be proposed.

Fig. (3). Healthcare transaction in blockchain.

Education Fig. (4) shows the transformation in education. We are witnessing the advancement of machine learning, smart classrooms, and distant learning with the help of the new technology. Chances are, in the years to come, blockchain will become an integral part of the schools. Let's address this technology's potential effect and possible changes to the learning process it might bring. Some organizations see blockchain as a great platform for storing, monitoring and using credentials from the students.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 53

Fig. (4). Transforming blockchain in education.

Blockchain would allow learners to access their records easily and conveniently and share any information with prospective employers. As such, employers do not need to contact universities and colleges to collect information on the achievements of the graduates. The most interesting use case for blockchain in higher education is to turn the “record holding” of qualifications, certificates and diplomas, making credentials digital and under the control of the learner, without the need for an intermediary to check them. The ability of blockchain to enhance electronic records also makes it a good fit for solving IP management problems. Blockchain can be used to decide whether an idea or innovation is unique and can be registered to IP properties, copyrights and patents. It could be leveraged as a solution to some general cases: safe and prioritized distributed data exchanges with multi-sensor satellites, and the monitoring and recording of power and control events. Over the course of the project, several experiments were conducted, revealing the distinct advantages and disadvantages of this technology, as it relates to satellite multi-sensor architecture [15]. However, blockchain technology has many uses where a block of data can be modified using a cryptographic security framework at the same time of sharing. Just recently researchers have begun considering what could be useful in implementing blockchain technology for Earth observation and space technologies. Recently the European Space Agency called for new concepts and implementations for earth exploration blockchains. The European Union has recently funded initiatives that use blockchain technology for science, such as the sharing and simultaneous use of scientific data, through which the European Space Agency aims to establish ways of using knowledge through and across different institutions [16].

54 Cross-Industry Blockchain Technology

Afaq et al.

Public Services Data created by government agencies are internally fragmented and opaque to people and businesses. When using blockchain technology, data records can be generated and checked easily, ensuring data protection and accountability. Blockchain technologies, such as digital signatures and time stamping, are expected to offer various benefits in public services to allow people to manage transactions and create individual accounts without the need of lawyers, government officials and other third parties. Several governments have adopted blockchain technologies to facilitate different public services for their people. For example, the Estonian Government has used blockchain technology to perform a variety of tasks using their ID cards, such as voting, registering for their companies, ordering medical prescriptions and paying taxes. In fact, the UK Department of Work and Pensions has begun to introduce a blockchain for welfare payments [17]. In addition, Sweden has carried out experiments to place real estate transactions on the blockchain. Cyber Security For all new and existing technologies, protection is one of the most important issues. Widely known businesses have faced a variety of security challenges. For example, Cambridge Analytica violated more than 50 million Facebook accounts in order to target them with targeted political ads that influenced United States voters by their ultimate decision on the presidential election. Likewise, in the year 2016, Yahoo the popular search engine experienced a big attack and compromised about one billion Yahoo accounts. As security firms analysed common security weaknesses, they noticed that 65 percent of data breaches occurred due to default, weak, or stolen passwords. They also noticed phishing emails stealing confidential data, such as password, username, and financial information [18]. Blockchain has a range of advantages that can be used to fix cyber security concerns. Second, blockchain is an untrusted framework where there is no trust. It implies that any insider or outsider can assault the framework, so that it is totally independent of human ethics. Second, blockchain is immutable, meaning that anybody can store and protect data with various cryptographic features, such as hashing and digital signature. As soon as the data is created as a block in the blockchain, it cannot be changed or removed. Third, blockchain requires many users on the network, so modifying or adding a block needs to be checked by the majority of users who make the attack very difficult to achieve [19]. BIG DATA Big Data is a gathering of massive amount of data. These data could be supervised or unsupervised to describe specific patterns, interests, and trends such as human

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 55

activities and attitudes to provide them with customized amenities. Big Data is one of the world’s fastest-developing areas. Every business needs to have an overview into their consumers’ usage patterns. Hence, large datasets are examined using sophisticated statistical models and data extraction. Over the near future, these Big Data sets will be even more prevalent. Big Data growth has raised a host of problems for large corporations and frequent consumers . Good analytics becomes more problematic with the growth in data. Some of the Big Data processing and analytical problems include so-called dirty data, unreliable data, and privacy concerns. As Big Data grows and the network of connected devices expands, more company data is exposed to possible security vulnerabilities [20, 21]. A consensual definition of Big Data after a review and analysis of the existing concepts is introduced. It is concluded, “Big Data is the detailed asset defined by such high volume, velocity and variety that require a specialized technology and analytical methods to turn them into value”. Systematically summing up the concept of Big Data, including its 5V properties, is of vital importance [22] (Fig. 5). According to a study [23] volume refers to data severity; variety refers to systemic stratification; velocity refers to the pace at which information is analysed and the velocity at which it will be processed and acted upon; value refers to accurate and valuable insights that Big Data should have; veracity refers to the uncertainty and inaccuracy inherent in the certain data sources. In addition, several features are discussed to further improve the Big Data concept [24, 25]. Vision (a purposeful and informative outcome-oriented analysis), Verification (requirements that match the data processed), Validation (aiming to accomplish purpose), Complexity (complicated relation between data) and Immutability (permanently processed and treated well). Since these features are frequently listed to define the meaning of Big Data, despite the complexity of fact, they assuredly play an important role in the frequently increasing understanding of Big Data, particularly when there is no broadly defined definition of this trans-era. Significance of Big Data Big Data is not about how much data an organization has, but how an organization collects the data and uses data in its own way; if a business is using its data more effectively then definitely the greater will be its ability to expand. The company will collect and analyse data from any source to find answers.

56 Cross-Industry Blockchain Technology

Afaq et al.

Fig. (5). Five V’s of Big Data.

Cost saving Some Big Data tools such as Hadoop and Cloud-based Analytics can offer cost savings to businesses when vast volume of data need to be processed and these tools can also help find more effective ways to do business. Time Reduction The high speed of tools such as Hadoop and in-memory analytics can easily recognize new data sources that help businesses analyze data quickly and make fast learning-based decisions.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 57

Understand the market Condition A better understanding of the existing business dynamics can be done by analysing Big Data. By observing the buying habits of consumers, a company may figure out the goods that are being sold the most and manufacture products according to this pattern. Control Online Reputation Big Data tools can evaluate emotions. So, you can get input on who says what about your business. If you want to track and enhance your company's online presence, then Big Data tools will aid with all of this. Using Big Data Analytics to Boost Customer Acquisition and Retention The customer is the most important asset that depends on any company. There is no single company that can assert success without having a strong consumer base first. But a company cannot afford to ignore the high competition it encounters, even with a customer base. If a company is slow to understand what consumers want, it starts selling goods of poor quality. Ultimately, consumer dissatisfaction will occur, and this will have an overall detrimental impact on business performance. Big Data helps organizations to identify different patterns and trend specific to consumer. To cause loyalty, it is important to observe customer behaviour. Usage of Big Data Analytics to Solve Problems and Promotional Insights into Advertisers Big Data analytics can help change any enterprise. This involves the ability to meet consumer expectations, changing the product line of the company and of course making sure the marketing strategies are strong. Big Data Analytics as a Catalyst of Product Creation and Innovation Another great benefit of Big Data is the ability to help businesses innovate and redevelop their products. Challenges in Big Data Current literature often attempts to sum up Big Data's problems by focusing on procedure for processing Big Data. Big Data issues in five areas relating to the process of information discovery are: data capture and storage, data processing, data curation, data interpretation and data visualization [26]. Others have adopted a common framework and tackled problems in four areas: data management and

58 Cross-Industry Blockchain Technology

Afaq et al.

support, model creation and scoring, visualization and user engagement, and market models [27, 28]. However, the problems of Big Data are addressed in a more detailed way that is Big Data management, cleaning, aggregation, imbalanced system capacities, and imbalanced Big Data analytics. They also tackled Big Data machine learning problems, including data stream learning, deep learning, incremental and ensemble learning, and granular computing. The challenges for Big Data are described as data representation, redundancy reduction and data compression, data life cycle management, advances in the analytical process, data confidentiality, energy management and sustainability, extensibility and scalability, and collaboration [29]. It translates problem into data complexity, computational complexity, and system complexity. Three factors that contribute to Big Data: Large Data complexity (i.e., data forms, size, architectures, etc.). Patterns, relationships, insufficiency, instability, and distribution result in increasing computational complexity and new computing concepts. The growing complexity of the system thus makes it difficult to meet the needs of advanced energy-efficient computing and Big Data processing. Data Mining Techniques for Big Data Data mining methods have been around in collaboration with data warehouses for many years and have now gained greater popularity with the emergence of Big Data. Data analytics and the growth of both structured and unstructured data have led to the improvement in data mining techniques, as businesses now deal with broader datasets with more diverse content. The data mining method is further automated by artificial intelligence and machine learning [30]. Fig. (6) illustrates the data mining techniques of Big Data. Clustering The main purpose of clustering is to aggregate data objects through data discovery, so that the grouped objects are identical or closely linked but distinguished from the other classes [31]. The fundamental principle of clustering is to calculate distance between data objects. Many techniques have been developed to satisfy the requirement of handling more complex data types or structures. The key clustering approach includes hierarchical clustering, k-mean (partitioning clustering), high-dimensional approaches, density-based clustering, clustering based on co-occurrence, and other evolutionary methods. By grouping those with the nearest mean, the commonly used k-mean clustering technique divides observation into different clusters ‘k’. It is noteworthy that due to the ongoing growth of data mining techniques, an alternative approach and development exists.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 59

Classification Classification is the most basic technique of data mining aimed at classifying data objects into predefined classes. To accurately optimize the classifier to perform the given classification task effectively, it requires a few rules that are defined through data exploration. The formal definition of the classification underlying the algorithm [32]. There are several different methods for classification, and each has its own merits [33]. Decision Trees [34], Support Vector Machines (SVM) [35] Naive Bayes Codes [36], Neural Networks and k-Nearest Neighbours [37] are some of the best-known and commonly used classification techniques. Association Mining Rules The Association Rule Mining is introduced on a dataset for the supermarket [38], with the goal of investigating co-occurrences between data items. It is a technique for detecting the simultaneous occurrence that occurs more often than the average level of co-occurrence that exists in the data collection. It distinguishes the relationship that exits among the data objects. Regression Due to its ability to reduce dimensions, extract information, provide estimates and forecast, regression is also considered a significant data mining technique. The basic regression principle is to analyse the relationship between two or more variables in order to assist in prediction and decision making. The regression analysis is widely applied to a wide range of topics, and several developments have also been made to date, so it is not feasible to summarize all of this in this chapter. Some of the Data Mining 's proven regression techniques include linear and nonlinear regression, lasso regression, logistic regression, and tree regression. Social Network Analysis A comparatively recent Data Mining technique outlined here is the Social Network Analysis (SNA), based on the graph theory principle. To build a social network, it investigates the relation and content between objects in a large stack of knowledge. The most widely used measuring technique for evaluating social network behaviours is ‘degree’ [39 - 41]. Applications of Big Data Healthcare Sector There is a significant improvement in healthcare with Big Data. It increased the amount of information collected over the last few years. Technology development

60 Cross-Industry Blockchain Technology

Afaq et al. .

has also made it easier to gather and analyse data from various sources such as insurance companies, hospitals, labs, and the offices of physicians. Doctors have historically used their discretion, and in recent years, this has been changed to a more evidentiary treatment. The modern method includes analysing clinical records and making recommendations about treatment on the best evidence available. When it comes to the use of Big Data, the healthcare sector has tended to lag from other industries such as financial services and sales.

Fig. (6). Data mining techniques.

Big Data is used in healthcare to forecast pandemics, cure illness, enhance quality of care and stop premature death and the different application of Big Data in health sector is illustrated in Fig. (7). A lot of fitness devices recently have hit the market like Fitbit, Samsung Gear Fit and Jawbone, helping us to monitor our

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 61

progress. Eventually we will be able to share the data with our doctor, who will be able to use it when we see him with an ailment as part of their clinical diagnosis. When more and more data is collected, physicians will be able to offer treatment choices for certain patients with specific disorders, genetic factors and lifestyle. The Big Data is kept in siloes inside the computer systems, hospitals, and clinics of numerous physicians [42, 43]. To make efficient use of them all in the future, it is needed to release the information with everyone.

Publich Records

Payer Records

Government Agencies

EHR Patient Portals

Big Data in Healthcare Generic Databases

Research Studies

Wearable DEvices

Search Engine Data

Fig. (7). Implementation of Big Data in health sector.

Owing to the great influence of Big Data in the healthcare sector, its use is growing day by day. But the path to bring this technology into action still has challenges. Let us look at some problems that have been frequently faced. One of the most difficult problems is the collection of data. The knowledge of patients is typically distributed through different departments, hospitals, computers and file cabinets. Proper preparation is required to fuse all these together and organize them for potential collaboration. In addition, all the collaborating entities will

62 Cross-Industry Blockchain Technology

Afaq et al.

have a common understanding and consent to the formats and forms of Big Data that they would like to examine. In addition to ensure the accuracy and consistency of data, data cleaning and management are also required. The procedures and policies protecting health data are often concerned with different problems. These issues should be resolved after aggregating and validating the data. Since there is no clear monitoring of the data from where it is being processed, the IT company may face difficulties related to money, security and results. The amount of healthcare data grows over time, and the executive team often faces challenges in managing the costs and consequences of data storage at the premise. Maintaining an on-site data storage system can be a complicated and expensive affair. This means the method of distributing the data through various departments can also be complicated. For health organizations, data security is essential. When health systems start incorporating Big Data, they should be granted access to the data by health care providers. When certain experts are given access by the organisation, there is no problem, but if a large team is involved with the personal details of patients, the issue may arise in terms of violation of privacy. Healthcare organizations will rely on reliable data providers with a stable and well-structured delivery to provide safe Big Data solutions to prevent these problems. Finally understanding the potential of Big Data in health-care companies need to change way to do business. Along with the skilled IT workers, data scientists are required to conduct the analytics. Without proper IT infrastructure, organizations may find it hard to make the most of Big Data. Education Sector The student data processing has only been a major educational trend in the [44] last decade. Moreover, the use of Big Data to help students in learning can be traced all the way back to ITS and artificial intelligence studies as shown in Fig. (8). In the field of education, the primary aim of using data in education today is to define approaches for creating optimal educational environment [45]. Big Data is a recent concept in education [46], with most academic discourses concentrating on the use of data to enhance the quality of teaching and science. Particularly the availability of broad educational data provides education to researchers with the ability to investigate the emerging educational trend on a large scale using digital methods and techniques. Three educational use cases are proposed for Big Data; promoting learning, teaching and administration.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 63

Fig. (8). Implementation of Big Data in education.

Big Data in the education field gives educators a unique opportunity to reach out to students in new ways and to teach them. It will give them a better educational experience, and thus help them decide the condition of the education system. Challenges Concerning the Application of Big Data in Education The schools and colleges depend on a lot of data relative to other large organizations. Extracting information from all the data begins by asking the correct questions. It also begins with identifying where Big Data can play a role and where there is no need for any possible effects. Large volume of data is generated in education in different formats. One of the difficulties inherent in any Big Data project is that most projects begin with the need to clean up the data. If companies work with existing sources or

64 Cross-Industry Blockchain Technology

Afaq et al.

numerous third-party databases, there is always a misalignment. Data scientists spend a great deal of their time cleaning up data and doing boring, timeconsuming janitorial work. In order to derive useful value from large datasets, it requires surety of communicate with one another, whether by APIs or algorithms, or a partial manual implementation, the hard work is to be done to clean up data sufficiently to allow sharing and interaction. Remote Sensing Remote sensing has been one of the most effective tools used to get information an efficient manner. The remote sensing data has played a significant role in many scientific fields in recent years, including atmospheric science, biodiversity, soil degradation, water pollution, and environmental geology [47]. Remote sensing techniques clearly display the properties of Big Data. Big Data remote sensing is gathering interest from government programs, and commercial applications to academic fields [48]. Fig. (9). illustrates the cycle of remote sensing data. The US government initiated the “Big Data” program in March 2012. It may be the first Big Data policy initiative focused on enhancing our ability to derive information from large and complex digital data sets. The Earth Observation System Data and Information System (EOSDIS) is one of the most ambitious tasks of the US government for satellite imagery of Big Data. It offers end-to-end functionality from different sources for handling NASA’s environmental science data. In Europe, the European Space Agency hosted a “Big Data from Space” conference in 2017. It was about stimulating interactions and bringing together researchers, developers, consumers, networks and service providers who are involved in leveraging Big Data from space. Big Data analytics refers to such a broad and dynamic array of data sets that conventional data processing algorithms and models are hard to employ. The challenges involved are data collection, storage, search, exchange, delivery, processing and analysis. The remote sensing Big Data has many unique and special features i.e., the data has multi-source, multi-resolution, high-dimensional, vibrant-state, enantiomer, and nonlinear characteristics. The remote sensing Big Data often represents a dynamic state since the earth surface varies, and the satellites are always moving. The remotesensing Big Data transition point involves both stationary components and nonstationary components. Big Data difficulty in remote sensing includes addressing a huge quantity of data [49]. The challenges related to data collection, storage, analysis and reporting often contribute to problems with remote sensing. Fig. (10) illustrates some common challenges we are facing for the collection of remote sensing data.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 65

Fig. (9). Big Data in remote sensing data.

Data computing

Data collaboration

Data Methodology

Fig. (10). Challenges in remote sensing data.

Big Data Analysis Tools and Techniques Big Data is a concept that describes the vast volume of data sets – both structured and unstructured with variety and complex structure with problems, such as data collection, storage, analysis, visualization and processing difficulties. It needs new Big Data tools and techniques, technical approaches for extracting and analysing data for insights leading to better decisions and strategic business steps. Some of the most usable and important tools are mentioned in Fig. (11).

66 Cross-Industry Blockchain Technology

Afaq et al.

Hadoop

Spark

Storm

Cassandra Mongo DB Fig. (11). Different tools for Big Data analytics.

Hadoop Hadoop is open-source Big Data processing software and has several attributes: scalability, reliability, error tolerance, high availability, local processing and storage, distributed and parallel computing, and cost performance. It uses a basic model of programming to process massive datasets through computer clusters [49]. Spark Spark AB is an open-source tool designed to process large data sets. Spark was developed to tackle Hadoop’s disc I / O and performance problems. It has many features (such as in-memory computing) that make it special, and it offers a datacaching facility in memory. Spark supports many programming languages for processing large volumes of data (Python, Java, and Scala) [50]. It is ten (10) times faster than Hadoop and Mongo DB.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 67

Storm Apache Storm is an open-source, real-time, distributed computing framework for Big Data processing. It is simple and clear; it can be used by any scripting language, and it supports YARN for machine learning, ETL, ongoing operations tracking, decentralized remote procedure call (RPC), and real-time analytics [51]. Cassandra Apache Cassandra is a distributed database that offers high flexibility and reliability without sacrificing the efficiency of quality. It is one of the best Big Data tools that can satisfy structured, semi-structured, and unstructured datasets of all categories. Mongo DB MongoDB is an open-source data analytics product that gives cross-platform capabilities to the NoSQL database. For the business that needs fast-moving and real-time data to take decisions, it is exemplary. MongoDB is the perfect choice for those looking for data-driven solutions. It is user friendly, as it makes installation and maintenance easier. MongoDB is both reliable, and cost-effective. Big Data Techniques Big Data requires exceptional strategies to handle a large amount of data effectively within a short run-time [52]. These fields have different methods, and they interact with each other too. Some tools and techniques are discussed in Figs. (12a and b). INTEGRATION OF BLOCKCHAIN AND BIG DATA The integration of blockchain technology and Big Data might provide some fascinating possibilities. There are many ways that blockchain can aid in handling Big Data, plus data analytics. This technology has the greatest potential in data quality. This means that the data that big business collects and validates on the blockchain can become much more useful for companies. Blockchains will give you more faith in the legitimacy of viewing results. Immutable entries, timestamping based on consensus, audit trails, and clarity about the source of data (e.g., kiosk or a sensor) are all fields where you can see progress as blockchain technology becomes more common.

68 Cross-Industry Blockchain Technology

Afaq et al.

Mathematical Models Fundamental Mathematics

Optimization methods

Statistics

Data Mining Neural Network Visualization Methods Signal Processing Machine Learning

Fig. (12). (a and b) Different tools and techniques for Big Data analytics.

Data Integrity Regulation of so-called dirty data (or misinformation) is an environment where blockchain can have a positive influence on the field of data analytics. Blockchain gives a transparent method for data integrity and audit trails to be performed as it identifies the origin of data across its connected chains. Blockchain guarantees data integrity by keeping a shared ledger maintained. The data stored on the blockchain is believable because they must have reviewed the process of verification that guarantees its accuracy. Data integrity is maintained when origin information and data block interactions are saved on the blockchain and automatically checked (or approved) before they can be used. It also allows for accountability, as it can track event and transaction occurring on the blockchain network. Manage Data Sharing A blockchain-based Big Data framework would grant providers to exchange records with any other part that has an interest without the exponential increase in risk factors that come from a network of different data silos. Data collected from data studies can be processed in a blockchain network in that respect. In this way, project teams should not duplicate data analysis already performed by other teams or reuse data that has already been used incorrectly. A blockchain platform can

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 69

also help data scientists monetize their work, likely through the exchange of analytical results stored on the database. Preventing Malicious Activity In this way, project teams should not duplicate the data analysis that is already performed by other teams or reuse data which has already been used incorrectly. A blockchain platform can also help data scientists to monetize their work, likely through the exchange of analytical results stored on the database. To change the rules of blockchain, a plurality of nodes need to be pooled together to establish consensus. So, accessing and manipulating data on a wide scale make it an almost impossible job for cybercriminals. Predictive Analysis It is possible to analyse blockchain data (just like other data types) to uncover useful insights into habits, patterns, etc. As such, they can be used to forecast potential outcomes of events such as consumer desires, customer lifetime value, volatile prices and company churn rates with reasonable accuracy. With blockchain, banks and other organizations need large-scale real-time data analysis that can track changes in data in real-time, allowing fast decisions to be made. CONCLUSION Blockchain and Big Data are two different technologies that showed a significant impact on data management with security. With this motivation, this chapter provides brief information related to blockchain and Big Data in terms of significance and applications. The integration of blockchain with Big Data is clearly illustrated in this chapter and the benefits of integration are discussed in terms of data integrity, predictive analysis, preventing malicious activity, and managing data sharing. CONSENT FOR PUBLICATION Not applicable. CONFLICT OF INTEREST The authors declare no conflict of interest, financial or otherwise. ACKNOWLEDGEMENT Declared none.

70 Cross-Industry Blockchain Technology

Afaq et al.

REFERENCES [1]

Review; "IEEE EUROCON 2017-17th International Conference on Smart Technologies"., IEEE, pp. 763-768, 2017.

[2]

P. Dunphy, and F.A.P. Petitcolas, "A first look at identity management schemes on the blockchain", IEEE Secur. Priv., vol. 16, no. 4, pp. 20-29, 2018. [http://dx.doi.org/10.1109/MSP.2018.3111247]

[3]

R. Beck, M. Avital, M. Rossi, and J. B. Thatcher, "Blockchain technology in business and information systems research", Business & Information Systems Engineering., vol. 59, pp. 381-384, 2017. [http://dx.doi.org/10.1007/s12599-017-0505-1]

[4]

X. Wang, L. Feng, H. Zhang, C. Lyu, L. Wang, and Y. You, "Human resource information management model based on blockchain technology", IEEE symposium on service-oriented system engineering (SOSE)., IEEE, pp. 168-173, 2017. [http://dx.doi.org/10.1109/SOSE.2017.34]

[5]

D. Puthal, N. Malik, S.P. Mohanty, E. Kougianos, and C. Yang, "The blockchain as a decentralized security framework", IEEE Consum. Electron. Mag., vol. 7, no. 2, pp. 18-21, 2018. [http://dx.doi.org/10.1109/MCE.2017.2776459]

[6]

G. Karame, and S. Capkun, "Blockchain security and privacy", IEEE Secur. Priv., vol. 16, no. 4, pp. 11-12, 2018. [http://dx.doi.org/10.1109/MSP.2018.3111241]

[7]

J. I. Zahid, A. Ferworn, and F. Hussain, "Blockchain: A technical overview", IEEE Internet Policy News, vol. 1, pp. 1-3, 2018.

[8]

S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system", 2018,

[9]

S.V. Akram, P.K. Malik, R. Singh, G. Anita, and S. Tanwar, "Adoption of blockchain technology in various realms: Opportunities and challenges", Secur. Priv., vol. 3, no. 5, p. 109, 2020. [http://dx.doi.org/10.1002/spy2.109]

[10]

T.T.A. Dinh, J. Wang, G. Chen, R. Liu, B.C. Ooi, and K.L. Tan, "Blockbench: A framework for analyzing private blockchains", Proceedings of the 2017 ACM International Conference on Management of Data, pp. 1085-1100, 2017. [http://dx.doi.org/10.1145/3035918.3064033]

[11]

K. Lei, Q. Zhang, L. Xu, and Z. Qi, "Reputation-based byzantine fault-tolerance for consortium blockchain", In: IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) IEEE, 2018, pp. 604-611. [http://dx.doi.org/10.1109/PADSW.2018.8644933]

[12]

K. Chan, and J. Liebowitz, "The synergy of social network analysis and knowledge mapping: a case study", Int. J. Manag. Decis. Mak., vol. 7, no. 1, pp. 19-35, 2006. [http://dx.doi.org/10.1504/IJMDM.2006.008169]

[13]

T.T. Kuo, H.E. Kim, and L. Ohno-Machado, "Blockchain distributed ledger technologies for biomedical and health care applications", J. Am. Med. Inform. Assoc., vol. 24, no. 6, pp. 1211-1220, 2017. [http://dx.doi.org/10.1093/jamia/ocx068] [PMID: 29016974]

[14]

W.J. Gordon, and C. Catalini, "Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability", Comput. Struct. Biotechnol. J., vol. 16, pp. 224-230, 2018. [http://dx.doi.org/10.1016/j.csbj.2018.06.003] [PMID: 30069284]

[15]

J. de La Beaujardiere, R. Mital, and R. Mital, "Blockchain Application Within A Multi-Sensor Satellite Architecture", In IGARSS 2019-2019 IEEE International Geoscience and Remote Sensing Symposium., IEEE, pp. 5293-5296, 2019. [http://dx.doi.org/10.1109/IGARSS.2019.8898117]

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 71

[16]

For more on blockchain and how Europe is seeking further application of blockchain for Earth observation, see https://eo4society.esa.int/2019/04/09/blockchain-and-earth-observation-a- whitepaper/

[17]

J. Hathaliya, P. Sharma, S. Tanwar, and R. Gupta, "Blockchain-based remote patient monitoring in healthcare 4.0", In: In 2019 IEEE 9th International Conference on Advanced Computing (IACC) IEEE, 2019, pp. 87-91.

[18]

P. Boucher, How blockchain technology could change our lives: In-depth analysis. European Parliament, 2017.

[19]

H. F. Atlam, R. J. Walters, and G. B. Wills, "Fog computing and the internet of things: a review", Big Data and cognitive computing, vol. 2, no. 2, p. 10, 2018.

[20]

A. De Mauro, M. Greco, and M. Grimaldi, "What is Big Data? A consensual definition and a review of key research topics", In: AIP Conference Proceedings vol. 1644. Melville: NY: AIP, 2015, no. 1, pp. 97-104.

[21]

A. De Mauro, M. Greco, and M. Grimaldi, "A formal definition of Big Data based on its essential features", Libr. Rev., vol. 65, no. 3, pp. 122-135, 2016. [http://dx.doi.org/10.1108/LR-06-2015-0061]

[22]

Y. Demchenko, C. De Laat, and P. Membrey, "Defining architecture components of the Big Data Ecosystem", 2014 International Conference on Collaboration Technologies and Systems (CTS), IEEE: Piscataway, NJ, pp. 104-112, 2014. [http://dx.doi.org/10.1109/CTS.2014.6867550]

[23]

A. Gandomi, and M. Haider, "Beyond the hype: Big Data concepts, methods, and analytics", Int. J. Inf. Manage., vol. 35, no. 2, pp. 137-144, 2015. [http://dx.doi.org/10.1016/j.ijinfomgt.2014.10.007]

[24]

C. Kacfah Emani, N. Cullot, and C. Nicolle, "Understandable Big Data: A survey", Comput. Sci. Rev., vol. 17, pp. 70-81, 2015. [http://dx.doi.org/10.1016/j.cosrev.2015.05.002]

[25]

A. Oussous, F.Z. Benjelloun, A. Ait Lahcen, and S. Belfkih, "Big Data technologies: A survey", Journal of King Saud University - Computer and Information Sciences, vol. 30, no. 4, pp. 431-448, 2018. [http://dx.doi.org/10.1016/j.jksuci.2017.06.001]

[26]

M. Chen, S. Mao, and Y. Liu, "Big Data: A Survey", Mob. Netw. Appl., vol. 19, no. 2, pp. 171-209, 2014. [http://dx.doi.org/10.1007/s11036-013-0489-0]

[27]

M.D. Assunção, R.N. Calheiros, S. Bianchi, M.A.S. Netto, and R. Buyya, "Big Data computing and clouds: Trends and future directions", J. Parallel Distrib. Comput., vol. 79-80, pp. 3-15, 2015. [http://dx.doi.org/10.1016/j.jpdc.2014.08.003]

[28]

Y. Hajjaji, W. Boulila, I.R. Farah, I. Romdhani, and A. Hussain, "Big Data and IoT-based applications in smart environments: A systematic review", Comput. Sci. Rev., vol. 39, p. 100318, 2021. [http://dx.doi.org/10.1016/j.cosrev.2020.100318]

[29]

X. Jin, B.W. Wah, X. Cheng, and Y. Wang, "Significance and challenges of Big Data research", Big Data Research, vol. 2, no. 2, pp. 59-64, 2015. [http://dx.doi.org/10.1016/j.bdr.2015.01.006]

[30]

A.K. Bhadani, and D. Jothimani, Big Data: challenges, opportunities, and realities.Effective Big Data management and opportunities for implementation. IGI Global, 2016, pp. 1-24. [http://dx.doi.org/10.4018/978-1-5225-0182-4.ch001]

[31]

P.N. Tan, M. Steinbach, and V. Kumar, Introduction to data mining. Pearson Education India, 2016.

[32]

H. Hassani, X. Huang, E.S. Silva, and M. Ghodsi, "A review of data mining applications in crime",

72 Cross-Industry Blockchain Technology

Afaq et al.

Stat. Anal. Data Min., vol. 9, no. 3, pp. 139-154, 2016. [http://dx.doi.org/10.1002/sam.11312] [33]

S.B. Kotsiantis, I. Zaharakis, and P. Pintelas, "Machine learning: a review of classification and combining techniques", Artif Intell Rev, vol. 26, pp. 159-190, 2007.

[34]

J.R. Quinlan, "Induction of decision trees", Mach. Learn., vol. 1, no. 1, pp. 81-106, 1986. [http://dx.doi.org/10.1007/BF00116251]

[35]

C. Cortes, and V. Vapnik, "Support-vector networks", Mach. Learn., vol. 20, no. 3, pp. 273-297, 1995. [http://dx.doi.org/10.1007/BF00994018]

[36]

P. Langley, W. Iba, and K. Thomas, "An analysis of Bayesian classi er", proceedings of the Tenth National Conference of Artificial Intelligence, 1992

[37]

M.D. Richard, and R.P. Lippmann, "Neural network classifiers estimate Bayesian a posteriori probability", Neural Comput., vol. 3, no. 4, pp. 461-483, 1991. [http://dx.doi.org/10.1162/neco.1991.3.4.461] [PMID: 31167331]

[38]

R. Agrawal, T. Imieliński, and A. Swami, "Mining association rules between sets of items in large databases", Proceedings of the 1993 ACM SIGMOD international conference on Management of data, pp. 207-216, 1993. [http://dx.doi.org/10.1145/170035.170072]

[39]

M.K. Sparrow, "The application of network analysis to criminal intelligence: An assessment of the prospects", Soc. Networks, vol. 13, no. 3, pp. 251-274, 1991. [http://dx.doi.org/10.1016/0378-8733(91)90008-H]

[40]

S. Wasserman, and K. Faust, Social network analysis: Methods and applications. vol. Vol. 8. Cambridge university press, 1994. [http://dx.doi.org/10.1017/CBO9780511815478]

[41]

M.Z.A. Bhuiyan, G. Wang, W. Tian, M.A. Rahman, and J. Wu, "Content-centric event-insensitive Big Data reduction in internet of things", In GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp. 1-6, 2017. [http://dx.doi.org/10.1109/GLOCOM.2017.8254997]

[42]

J. Son, J. Park, H. Oh, M. Bhuiyan, J. Hur, and K. Kang, "Privacy-preserving electrocardiogram monitoring for intelligent arrhythmia detection", Sensors (Basel), vol. 17, no. 6, p. 1360, 2017. [http://dx.doi.org/10.3390/s17061360] [PMID: 28604628]

[43]

J. M. Lodge, and L. Corrin, "What data and analytics can and do say about effective learning?", npj Science of Learning, vol. 2, no. 1, pp. 1-2, 2017.

[44]

Y. Mor, R. Ferguson, and B. Wasson, "Editorial: Learning design, teacher inquiry into student learning and learning analytics: A call for action", Br. J. Educ. Technol., vol. 46, no. 2, pp. 221-229, 2015. [http://dx.doi.org/10.1111/bjet.12273]

[45]

A.G. Picciano, "The evolution of Big Data and learning analytics in American higher education", Online Learning, vol. 16, no. 3, pp. 9-20, 2012. [http://dx.doi.org/10.24059/olj.v16i3.267]

[46]

P. Liu, L. Di, Q. Du, and L. Wang, Remote sensing Big Data: theory, methods and application., 2018. [http://dx.doi.org/10.3390/rs10050711]

[47]

R. Eynon, "The rise of Big Data: what does it mean for education, technology, and media research?", Learning, Media and Technology., vol. 28, no. 3, pp. 237-240, 2013. [http://dx.doi.org/10.1080/17439884.2013.771783]

[48]

I. Gartner, and M. Beyer, Gartner says solving ‘Big Data’challenge involves more than just managing volumes of data. Gartner Special Report Examines How to Leverage Pattern-Based Strategy to Gain Value in Big Data. Gartner: Stamford, CT, US, 2011.

[49]

A. Spark, Apache spark: unified analytics engine for Big Data., 2018.

Blockchain Technology for Big Data

Cross-Industry Blockchain Technology 73

[50]

Apache Storm, "Apache Software Foundation", Accessed: http://storm.apache.org/

[51]

B. Daniel, "Big Data and analytics in higher education: Opportunities and challenges", Br. J. Educ. Technol., vol. 46, no. 5, pp. 904-920, 2015. [http://dx.doi.org/10.1111/bjet.12230]

[52]

M.A. Khan, and K. Salah, "IoT security: Review, blockchain solutions, and open challenges", Future Gener. Comput. Syst., vol. 82, pp. 395-411, 2018. [http://dx.doi.org/10.1016/j.future.2017.11.022]

74

Cross-Industry Blockchain Technology, 2022, 74-86

CHAPTER 4

Hydroponics Monitoring System Based on IoT and Blockchain Harpreet Singh Bedi1,*, Raghav Gupta1, Manoj Sindhwani1 and Kamal Kumar Sharma1 School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India 1

Abstract: Since blockchain is the central technology of bitcoin, block chain has gained a lot of attention in recent years. Its applications are expanding in a variety of fields, including Internet of Things (IoT) defense, banking, industries, and medical centre. Furthermore, IoT has grown in popularity because of its widespread usage in smart homes and urban developments around the world. This paper presents the design of an automated system for a greenhouse focusing mainly on Hydroponics. Along with the design, the purpose of this study is monitoring, control, and visualization of the data. This project addresses some of the issues in traditional farming. Issues like incapability of agriculture due to small and fragmented land holdings, risk in using manures and pesticides, and lack of mechanization. The segments of this project include the main module (referred to as AGMS), the cloud, and the end user. The data visualization is done through a website that will acquire it from a Wi-Fi module through APIs. The study also includes social media alerts to platforms like Twitter and mail.

Keywords: API, Blockchain, MCU, Server. INTRODUCTION As we know, agriculture is the main requirement above anything else and the traditional practices are just degrading over time. The Indian Agriculture sector accounts for 18% of total GDP (Gross Domestic Product) still, there is no major development in the agricultural practices followed in the country. There are, however, some modern techniques like Hydroponics, Aeroponics and Vertical Farming.. Agriculture is the world's major source of food. Throughout the history, it has been a critical parameter to the advancement of civilizations. According to the United Nations (UN), the world's population will rise by 2 billion people to 7.8 Corresponding author Harpreet Singh Bedi: School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India; E-mail: [email protected]

*

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

Hydroponics Monitoring System

Cross-Industry Blockchain Technology 75

billion by 2050, implying that the planet will need to feed around 11 billion people by the end of the century. As shown in Fig. (1), there have been four distinct revolutions in agricultural development: 1) age of traditional agriculture with human and animal power, 2) age of mechanized agriculture with rumbling sounds, 3) age of automated agriculture with high-speed development, and 4) age of smart agriculture with emerging technologies. As a result, smart farming provides a technologicallyassisted road to sustainability. It entails the use of ICTs in the cyber-physical cycle of farm management, utilizing technologies such as the Internet of Things (IoT), cloud computing, robotics, and artificial intelligence (AI).

Fig. (1). The four agricultural revolutions.

Smart farming is a sustainable farming technique that enhances operational precision by giving each plant or animal exactly what it needs to thrive in the best possible way, maximizing overall performance while reducing waste, inputs, and pollutants. While smart agriculture is an advanced tech, it simply takes field circumstances into account. Smart farming, on the other hand, goes a step further by management responsibilities of data, which is reinforced by context and situational awareness and driven by real-time events. Smart farming profited in the early years by advances in new technologies such as the Internet of Things, low-cost and enhanced sensors, actuators, and microprocessors, high-bandwidth wireless technologies, cloud-based ICT systems, Big Data analysis, AI, and robots. Farm equipment is no longer the only

76 Cross-Industry Blockchain Technology

Bedi et al.

source of data; new services exist that transform data into action. The use of IoT in agriculture attempts to equip farmers with the tools they need to help them make better decisions and automate their processes by providing goods, knowledge, and services that improve productivity, quality, and profit. Hydroponics is a method of growing plants on a water surface without the need for soil. The nutrients plants get, otherwise when grown in soil, are given manually as per the requirement. The major advantage of this method is the time required for the growth and the absence of any fertilizers in the process. When done in a very small area, hydroponics does not require an automated system, but when done for mass production, an automated system is vital. Automated Greenhouse Monitoring System provides the automation, control and visualization for hydroponics. The automation is done by a programmable Microcontroller Unit connected to various sensors required for plant growth. The control is by the MCU along with the end user interface. The complete process is run through a cloud server, which will always be active and send alert and warning to the end user interface which comprises a website and data visualization through numbers and graphs. The main effort on the cloud is data transmission at a very low data rate so that this project has a vast reach. The end user part is simple, taking into consideration that farmers can use this with zero effort. The system addresses the problems like the monitoring and control of any automated system without the need of human intervention. DISCUSSION Hydroponics There are various methods to perform hydroponics, the best and the most efficient one being NFT (Nutrient Film Technique) method. This technique is very much popular for its simple yet efficient design. The NFT is often used to grow fastgrowing plants like lettuce and spinach. Apart from these, commercially, green herbs and strawberries can be grown with this method. In this technique, a very shallow nutrient solution is poured down the tubing. This tubing is adjusted at a slant and consists of a hole on the upper side of the house, for which the small containers consisting of the seed/saplings are needed. These containers are net pots to contain plants and the growing media like coconut fibre and dried grass. The various parts of the NFT system consist of a reservoir for the nutrient solution, a nutrient pump for the nutrients up to the tubing, tubes to distribute water from the pump to the growing pots, pots to contain plants/seeds

Hydroponics Monitoring System

Cross-Industry Blockchain Technology 77

and a return system to collect the solution and send it back to the tubing to loop the process. The grow tray and the storage are two most important parts of the NFT process out of all other components. The grow tray is made up of net pots that contain the plants and the nutritional solution, as well as growing media such as coconut, perlite, and Rockwool. However, certain plant species do not require these solutions because they receive adequate moisture, nutrients, and oxygen from the system. The plant roots form a dense mat in the channel, while the foliage lies on top, supported by a trellis system in some cases (resembling a system where grapevines are grown).To make the best NFT system, the right slope, flow rate and channel length are required. Also, the plat roots have to be exposed properly to collect enough oxygen, moisture, and most importantly nutrients [1]. The nutrients required in this system are divided into 12 parts and two different solutions. Solution ‘A’ consists of 19% calcium, 15% nitrate or 45% potassium, and 13% nitrate. It will also have EDTA acting as a chelating agent. Solution ‘B’ has magnesium sulphate, mono potassium phosphate, and potassium sulphate as the main nutrients and solubor from boron, zinc sulphate, magnesium sulphate, copper sulphate and molybdenum as micronutrients. Overall, the nutrients required are nitrogen, potassium, phosphorous, calcium, magnesium, sulphate, iron, manganese, copper, zinc, molybdenum, boron and chlorine. These nutrients are readily available as the above-mentioned solutions. The material used as the growing medium will be coco coir, rock wool or peat moss based on the requirements. As for the water, distilled water, RO water or diluted tap water with reduced ppm is used. The water has to be changed every week or so (sometimes 4 days) in quantities of 19 litres. BLOCKCHAIN SOLUTIONS FOR IOT The blockchain is a peer-to-peer network in which every node has the same copy of all data. When a transaction is launched, the initiator node signs it with its private key and sends it to the rest of the network for confirmation. All other miner nodes are involved. Try to find a nonce by going through the invalidation process [2]. All completed transactions are registered in a list of blocks in blockchain technology, which is referred to as a public ledger. This blockchain continues to evolve as new blocks are added to it on a regular basis. For user protection, public key cryptography and distributed consensus algorithms were implemented. In a blockchain network, the consortium blockchain is used to provide data protection. Each side chain oversees its own IoT data. Each IoT device is given a unique id to monitor data in the blockchain network. Data obtained from a

78 Cross-Industry Blockchain Technology

Bedi et al.

computer relates to its id, and the data is sent to the entire network after a hash is calculated on it. This serves as the foundation for data that can be trusted. The fundamental storage cost would grow in parallel with the scale of the IoT network information sharing. As a result, information sets are in remote locations, and a centralized server is maintained to store only the references to these locations. Features The blockchain technology offers the highest level of transparency, and various industries are putting it to the test to see if it can be used for data transfer, record keeping, and other backend procedures [2]. It gradually allows people to follow documents and certify ownership of assets digitally as an unalterable record. The following are the fundamental elements that make blockchain a technological revolution, as shown in Fig. (2).

Fig. (2). Basic blockchain structure.





Transparency: In general, for public blockchain systems like Ethereum and Bitcoin, users have equal access and communication with the blockchain network. Furthermore, each transaction is verified and recorded in the distributed ledger, which is accessible to all users at the same time. Thus, data on the blockchain is transparent to each node so as to validate the committed transaction in the blockchain. Decentralization: In existing payment management systems, such as a bank, a central agency performs transaction validation, resulting in a performance bottleneck, costly design, and a single point of failure. On the other side, blockchain allows for the validation of transactions between two nodes without the need for any intervention, jurisdiction, or central authority. As a result, the overall service cost, performance bottleneck, and danger of single-point failure are reduced.

Hydroponics Monitoring System ●







Cross-Industry Blockchain Technology 79

Immutability: Since the blockchain is based on a series of linked blocks, each containing a hash of the previous block's header, any tampering with the data invalidates all subsequent blocks. Any mutation is quickly detected since even minor changes to any transaction result in the generation of a new Merkle tree data structure. Pseudonymity: Regardless of the transparency of blockchain transactions, the system can maintain a measure of anonymity by providing users with anonymous addresses. However, because these addresses may be traced, blockchain systems can only retain confidentiality to a certain extent. As a result, blockchain can only provide pseudonymity, not complete confidentiality. Non-Repudiation: Each node in the blockchain transaction process is given a private key. Other nodes can then access and validate this information using the associated public key of that node. As a result, transactions signed digitally with cryptography cannot be refused by the transaction's source node. Traceability: Every transaction in the distributed ledger has a timestamp linked to it that is recorded at the time of the transaction. As a result, after analysing blockchain data with linked timestamps, users may easily verify and trace the origins of transactions as well as alterations.

Blockchain Types Participants can use blockchain as either a writer or a reader. A reader takes a passive role in the transaction process, focusing instead on analysing the contents of records or validating the blockchain. Writers, on the other hand, take an active role in the transaction process and can use consensus techniques to expand the chain. On the basis of the permissions granted to users for interaction with the ledger, blockchain is divided into three types. The subsections below go through each of these categories. Public Blockchain Permissionless blockchain is known as public blockchain. These make it easier to participate in consensus processes and give any entity, as a reader or writer, full access to the main chain. Incentives are commonly used in mining to induce miners to mine blocks. As a result, transaction costs in public ledgers are higher than in private ledgers. Private Blockchain Distributed ledger is another name for private blockchain. The number of miner nodes in this category is limited, and their identities are known. As a result, only a limited number of miner nodes are allowed to participate in the transaction. Furthermore, a user's permission to access data linked to him or her may be

80 Cross-Industry Blockchain Technology

Bedi et al.

limited. In comparison to public blockchain, the secrecy of user data is higher in private blockchain. Consortium Blockchain The basic goal of a consortium blockchain is to scale the effect of cooperation in order to address the challenges encountered by a certain industry. As a result, an advantageous framework is established that encompasses both allies and commercial competitors. This blockchain is semi-decentralized, which means it is supervised by a small group of people. The blockchain is entirely controlled by a single group, but it is free of monopolies. This control allows each node to establish its own instructions, edit or erase erroneous transactions, change account balances, and so on once each node agrees. The centralized nature of consortium blockchain, on the other hand, renders it defenseless against hostile entities. Finance, banking, healthcare, insurance, and logistics are some of the industries where consortium blockchain can be used. Greenhouse A greenhouse is a controlled environment to grow plants. It is made up of transparent medium for walls and semi-transparent for the roof for controlled sunlight. Plants, requiring regulated climatic conditions are grown in a greenhouse. A greenhouse makes it conceivable to reproduce a different atmosphere and thus develop nourishment that would not typically develop in the zone. Also, making the nursery mechanized enables people to develop their own nourishment or plants at home without continually look after them. The purpose of greenhouse is to maintain the nursery temperature in an ideal range for ideal plant development utilizing a temperature control framework. Another goal is to explore if the watering system is solid, to get an ideal soil dampness level for the picked plant [3]. The room temperature is thought to be at 15 - 21°C. Another presumption is that the temperature outside of the greenhouse, will consistently be colder or equivalent to the temperature within the greenhouse. The plant that will be placed in the greenhouse will be favoured to temperature at room temperature or above. The consequence of the exploration questions depend on time limited experiments. This result could be different over the long haul and it is accordingly not substantial in that case. The value when the dirt is viewed as excessively wet or too dry is dependent on the type of the soil utilized. These qualities cannot be

Hydroponics Monitoring System

Cross-Industry Blockchain Technology 81

utilized on different types of soils that have to be exclusively set with the assistance of the tests. As for the field of hydroponics, there is a requirement for a greenhouse and many advantages are linked to it. Some of the advantages are as follows. 1. It will help to maintain optimum conditions, as per the plant grown. 2. It will ensure maximum photosynthesis performance by providing required conditions. 3. It provides improved water use. 4. It shortens crop cycles i.e. plants grow faster as compared to traditional farming methods. 5. It will help to resolve the problems caused by soil depletion. For this study, more economical and compact greenhouse under 2x2 m is implemented that enclosed a hydroponics system of under 1.5x1.5 m. This monitoring system comprises interfacing of sensor with the main MCU and will control them, based on the requirement for the plant, e.g water level sensor is interfaced with the motor to keep the level of water under a threshold by controlling the rate of water being pumped. Along with that, all the data is sent to the cloud using a server and displayed on a website in the form of graphs, charts, and numbers [4]. Hardware The hardware part of this system is divided into three parts -AGMS module, hydroponic system, and greenhouse. The hydroponic system and greenhouse have already been discussed shown in Fig. (3). Al the above-displayed sensors work in synchronization with each other. Every threshold in-capacitance of one sensor directly impacts the other one. The AGMS module consists of a Micro Controller Unit embedded in a waterproof casing that is connected to various sensors listed as: DHT22: A digital temperature and humidity sensor with good accuracy with ±1oC.

82 Cross-Industry Blockchain Technology

Bedi et al.

Fig. (3). Block Diagram of Project.

Water level sensor: Water level sensing module gives an analog reading the height of water and has to be further converted into cm [5]. pH sensor: Detects the pH value of the solution. Buzzer: Makes a sound whenever there is a high value at the input. L293d: Motor driver IC to control the pump. Touch Screen: To display the values of various sensors in multiple forms. It is programmable. ESP8266: For sending the data to the server. It is a Wi-Fi module working at 2.4 GHz. LDR: It is a Light Dependent Resistor that gives an analog output value based on the intensity of light falling on it. The Micro Controller Unit used is Arduino Mega. Arduino Uno is not used here despite the familiarities because of the number of ports and memory of the Mega.

Hydroponics Monitoring System

Cross-Industry Blockchain Technology 83

Server and Cloud For any efficient monitoring system, all the data has to be visualized and displayed on any device. For this purpose, we use a server which is programmable like a Digital Ocean Droplet or a pre-made one like Thingspeak, as shown in Fig. (4). The data from the sensors is processed by the Arduino to Thingspeak using an API key and ESP8266, a Wi-Fi module [6]. This process is simple as one has to give an API key to get the data as shown in Fig. (4). The only limitation of Thingspeak is that it is not programmable and there are very limited functions whereas, in the case of Digital Ocean, it is totally customised right from the memory, number of cores in the processor, and the type of operating system for the server. The data from the server is then captured by a webpage using API keys in JS and displayed in it. The website can be made from the scratch or from custom templates readily available on the internet. The main thing to keep in mind is the APIs for transferring the data [7]. Each sensor data is individually sent to the cloud without any cross-dependency. Each sensor will be modular i.e. they can be easily disconnected and replaced when needed, Fig. (5). The sensors will be connected to the ports of the module casing and can even be made wireless with the help of any Bluetooth or any Wi-Fi modules, as shown in Fig. (6). WORKING The total system works in synchronization with the hydroponics. To make it simpler, we will break the procedure and working into steps. The first step is to select the plant type to be grown. Then selection of the nutrients and all other parameters like the humidity, optimum temperature, water level, water flow, growing medium etc. is taken care of. Secondly, all these are assembled to the hydroponics system through the NFT technique. The whole hydroponics system is enclosed by a greenhouse that also has the main module in it. Now this module with all the sensors will sense the data at customized intervals and send it to the cloud. The threshold of each sensor is already fed to the module in the programming. When any sensor goes out of the threshold, the alarms get activated. In this case, the alarms are the buzzer and the alerts i.e. website alerts, GSM alerts, twitter alerts and mail alerts. Also, some of the modules will automatically adjust the threshold, e.g. when the water level goes above the optimum level, the flow rate of the motor decreases. For the humidity, exhaust fans and sprayers are used whereas for the temperature, high wattage incandescent bulbs are used.

84 Cross-Industry Blockchain Technology

ThingSpeak

Channels

Apps

Bedi et al.

Support

Commercial Use

How to Buy

Account

Sign Out

AGMS_final channel ID:995088 Author:saideeplle1 Account:Private

Private View

Public View

Add Visualizations

Channel Settings

Add Widgets

Sharing

API keys

Data Import/Export

Export recent data

MATLAB Analysis

MATLAB Visualization Channel 4 of 4

Channel Stats Created: a day ago Entries:0

Field 1 Chart

Field 2 Chart AGMS final

TDS

TDS

AGMS final

Date

Date ThingSpeak.com

Field 3 Chart

ThingSpeak.com

Field 4 Chart AGMS final

pH

WATER LEVEL

AGMS final

Date

Fig. (4). Thinkspeak website

ThingSpeak.com

Date ThingSpeak.com

Hydroponics Monitoring System

Cross-Industry Blockchain Technology 85

Fig. (5). Ubuntu server

Fig. (6). Setting up configuration

CONCLUSION Agriculture was the first occupation of humans; it is the foundation for all the Industries. The world’s population is increasing day by day and there is an increasing requirement of food. In India, 3000 children die every day due to malnutrition.

86 Cross-Industry Blockchain Technology

Bedi et al.

The greenhouse monitoring system gives the flexibility of growing crops in any seasons. This enhances the moderate cost and availability of seasonal vegetables throughout the year. The crops that are grown with the techniques like hydroponics and aquaponics and are free from pesticides are nowadays called organic food. The techniques of Aquaponics and hydroponics give flexibility to the soil because these processes do not require any soil so any crop can be grown in any part of the world and the greenhouse can be constructed anywhere in the world so import and export will be quite less. It can be implemented for any fresh vegetables. CONSENT FOR PUBLICATION Not applicable. CONFLICT OF INTEREST The authors declare no conflict of interest, financial or otherwise. ACKNOWLEDGEMENTS Declared none. REFERENCES [1]

K.S. Nemali, and M.W. van Iersel, "An automated system for controlling drought stress and irrigation in potted plants", Sci. Hortic. (Amsterdam), vol. 110, no. 3, pp. 292-297, 2006. [http://dx.doi.org/10.1016/j.scienta.2006.07.009]

[2]

Y. Kim, R.G. Evans, and W.M. Iversen, "Remote sensing and control of an irrigation system using a distributed wireless sensor network", IEEE Trans. Instrum. Meas., vol. 57, no. 7, 2008.

[3]

F. Mei, "—Smart planet and sensing china—analysis on development of IOT‖", Agricultural Network Information, vol. 12, pp. 5-7, 2009.

[4]

Qi-Bo Sun, Liu Jie, Li Shan, Chun-Xiao Fan, and Juan-Juan Sun, "Internet of things: Summarize on concepts, architecture and key technology problem, Beijing Youdian Daxue Xuebao", Journal of Beijing University of Posts and Telecommunications, vol. 33, no. 3, pp. 1-9, 2010.

[5]

Z. Xing, L. Guiping, X. Shi, C. Cheng, and L. Wen, "—Construction of agricultural service mode in IOT and cloud computing environment‖", Nong-ji-hua Yanjiu, vol. 4, pp. 142-147, 2012.

[6]

Tanu Saha, and Ashok Verma, "Automated Smart Irrigation system using Raspberry Pi", International Journal of computer applications, vol. 172, no. 6, 2017.

[7]

D. Veera Vanitha, S. Nivitha, R. Pritha, J. Saranya, and T. Shobika , "Automatic Drip Irrigation System using Raspberry PI and Wireless Sensor Networks", IJIRSET, 2011.

Cross-Industry Blockchain Technology, 2022, 87-109

87

CHAPTER 5

Recent Trends in IoT Healthcare-based Blockchain Solutions Himanshu Sharma1, Hardik Chaurasia1, Arpit Jain2,* and Nazir Ahmed1 Electrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, India 2 AI Practitioner, QpiAI India Pvt. Ltd., Bengaluru, India 1

Abstract: This review revolves around the idea of inculcating and amalgamating all the possible forte of healthcare that can be governed and handled by Blockchain Technology (BCT). Relating back to all the archaic systems involved in the healthcare sector, the entire process was quite slow and many a time leads to a significant amount of delay in any process, be it report of the patient, tracking data from the smart watch, ruling out appointment from a doctor, medicine prescription and many more. BCT in fusion with the Internet of Things (IoT), leads to generating a completely revolutionary and robust system that expands its range from very minute detail to a completely new horizon. As predicted by 2022, more than 18 billion devices will be available across the world; thus, managing this data that is related to healthcare, devising BCT for same can yield some exponential results in advancement in health care sector. This entire healthcare data is quite vulnerable to all the cyber-attacks and all the collected valuable information may be at a huge risk; hence by deploying BCT, security can be greatly increased. BCT is nothing but an immutable time stamp series of records, just like an array working; when even one of the blocks is initialized with any value of information, that piece of information will remain there forever. This review attempts to group together all such various fields that can be brought under a single umbrella covering the range of fields that can be governed by BCT in accordance with IoT for the development of health care sector.

Keywords: Blockchain Technology, Internet of Things, Hash Code, Healthcare, Protocols. INTRODUCTION The recent advances for the promotion of the crypto currency-based ledger system known as Block Chain Technology (BCT) have taken a huge leap in IoT and health care. As everything is web controlled so making use of BCT and IoT to Corresponding author Arpit Jain: AI Practitioner, QpiAI India Pvt. Ltd., Bengaluru, India; E-mail: [email protected]

*

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

88 Cross-Industry Blockchain Technology

Sharma et al.

govern the health sector would be a good opportunity to make this entire system of health care more robust and highly efficient. Internet of Things (IoT) is nothing but a sphere of interconnectivity of devices via the internet so that each and every device can be controlled through web. It encompasses a broad range of applications such as health management, smart homes, traffic, agriculture, and weather monitoring to name just a few because its growth is quite humungous at a particular speed. IoT devices are quite light [1] and thus lead to shallow energy footprints. Having just this less amount of energy, the most of it is completely utilized in the main function that the device performs. Hence, leaving very few amount of energy for applications such as security and privacy. This opens the path for BCT as it overcomes the problem mentioned before as it is secure, distributed, immutable, transparent, etc. The protocols governing BCT make the information secure in the form of block transactions that simply correlate with the respective application. Once this chain of blocks is completely filled, it appends to other chains via a process called as mining process and this process is performed by specific nodes called as miners. Although BCT deployment is not easy as it seems as there are various problems associated with it. Deploying BCT and IoT for the application such as healthcare is quite promising and these are well equipped. A system proposed [1] for Remote Patient Monitoring (RPM) is mainly focused on providing health care facilities other than hospitals. The whole concept is about an IoT wearable device that the patient wears and the device provides all the vital information via cloud protected by BCT, to the respective health care center. Although there are various problems associated with IoT like network overhead delay, mismanagement of the data and many more but BCT very effectively overcomes all these problems. BCT encompasses various positive points including privacy, trustworthiness, smart contracts, DDoS notification and mitigation but other problems may persist as bandwidth limit, network issues and many more. Before critically analyzing every aspect discussed so far, let us dive into its very basics. Healthcare A professional field, particularly of science that is a sheer management and improvement of health through appropriate history taking, prevention, diagnosis, standard procedures, treatment, and ensuring recovery of various ailments in people is known as Healthcare [2]. We have witnessed the advancement trend in the medical sector and it is enumerated to have the most impact on the business and society for the next 35 years. Healthcare has a very wide spectrum – from having large glass like structures providing every medical facility in the urban areas to struggling for a decent treatment in rural areas. Looking on the development being made in the Healthcare sector, this gap is expected to widen in the future years [3]. There is a buzz that a day will come when AI (Artificial

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 89

Intelligence) driven robots will operate on patients. For now, it may seem as a long shot but nevertheless steps have already been taken so as to proliferate this domain of AI for decisions in treatment [4]. New and automated technologies are being introduced in the hospitals that work using IoT and are able to analyze the patient’s health status every time. Now we are taking into account various new factors emphasizing on health, like steps per day, water intake per day, number of floors climbed, and average walking speed [5]. Finding new and innovative reforms in this paradigm is quite tedious and requires huge deal of iterations. So, discovering new reforms has now extended beyond the boundaries for healthcare practices as they are being developed since 1950s. Although these prior reforms just focused on improving the safety and quality of healthcare, now the reforms are made to improve the quality of service ranging from local organization level to decision level organizations. More importantly, these are not only the tools that are driving healthcare sector to reach greater heights, but the organizational factors are also important to implement and sustain the new paradigm [6]. The most important factor affecting healthcare is diversity of the people. This brings in the theme of World Health Organization (WHO) for 2018 “Universal Health Coverage – Everyone, Everywhere”. Many factors like social, political, financial, geographical and cultural, affect the availability of all facilities for the people [7]. Even if somehow or someway, all these facilities are made available, what guarantees that it is given to them regularly and a constant check is kept on the patients? The first idea that strikes our mind is ‘Manpower’ and more or less many may run out of ‘Manpower’. So, the follow up solution is ‘Accountability’ – the patients expect a certain standard of treatment due to a particular conduct. They should be able to trust the personnel in front of them with their sensitive information. In recent years, with digitization creating an umbrella in this tech world, many health care centers are now shifting towards Big Data and IoT for the welfare of their patients and monitoring them continuously – ‘remote patient monitoring’ [8]. This remote monitoring is increasing at a very faster rate from 7.1 Million in 2016 to an estimated 50.2 Million in 2021 [9]. The information and data so gathered may be vitals or records, is being stored and monitored on a regular basis thus in return giving birth to HIE – Healthcare Information Interchange. Determining which trials and methods are used on one patient at a place makes it useful for a doctor to implement it at another place on a person having the same problem, by checking the records [10]. By implementing this method, new treatments can be found and doctors can learn more about the disease, thus developing a precision medicine. This new paradigm of healthcare is preventing and predicting diseases beforehand using the data being collected from regular monitoring of the patients. By training multiple Machine Learning models, we can predict for which disease the patient is more vulnerable and doctors can treat that

90 Cross-Industry Blockchain Technology

Sharma et al.

beforehand. We are no longer going to wait for the patient to get sick, instead we will be able to predict and prevent the disease before it will even get its grip on the human body [4]. This provides us with a gist of what has been so far implemented and what are the types of approaches being followed in the healthcare sector. Blockchain With the increase of cloud storage, Internet of Things and cyber-attacks, it is important to adapt methods capable of ensuring the security of the sensitive data being collected [11]. IoT can become more complicated in the future when it will be connected with Network of Plentiful Things (NPT). If we are stuck with the centralized structure of IoT, we will not only increase the traffic in the network but will also have no scalability in our network [12]. A blockchain like protocol, being first introduced by David Chaum in 1982 and further worked upon by multiple individuals in the upcoming years, has emerged as an alternate to overcome various challenges put forward by IoT. If we turn back the pages of history, the first blockchain was conceptualized in 2008 by Satoshi Nakamoto and was a core component in Bitcoin, a crypto-currency – where it worked as a ledger for all the transactions taking place [13]. In past few years, the concept of crypto currency has gained a huge deal of fame and importance because of the quirk it possesses. Blockchain is a decentralized, distributed and an immutable ledger containing all the transactions and data in blocks. It has three main parts – Block, Miner and Node. Not only being smart and secure, it ensures that no additive noise is added up and thus bringing no disruption to data, which was a problem in other security methods [14]. Furthermore, it enables integrating several core technologies like cryptographic hash, digital signature and distributed consensus mechanism [13]. Moreover, it can be private or public depending on the user. Blockchain creates an immutable ledger of the blocks in which each block contains timestamps of all the transactions taking place (Fig. 1) [8]. Each block in Blockchain has two main headers – the block header and policy header. The block header contains information regarding the previous block, thus making the ledger immutable and the policy header is used to authorize the devices involved. Every data is authorized with a Public Key that is provided to the users; only then a smart device will be able to access or use the Blockchain and the storage [15]. As forecasted in a study [16], BCT may tend to contribute to entirely phase shifting the way people pay for goods or any commodities they purchase, through this increase in cryptocurrency. There are various risks associated with BCT such as private key security, criminal activity, double spending, transaction privacy leakage, criminal smart contract, vulnerabilities in smart contract, underoptimized smart contract, and underpriced operations that are very effectively

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 91

explained [17] but simultaneous solutions, various proposed framework and refined algorithms too have been provided for the same in the past few years that tackle these issues very effectively. Although BCT can be applied anywhere for good but more importantly it finds its value in security and financial industry, as it has already triggered multiple projects in industries. BCT promises to overcome very subtle aspects representing, “a shift from trusting people to trusting math” [16]. The Smart Home Miner manages most of the things like generating transactions, distributing and updating keys, managing a local storage (used to store data locally – uses First in First out (FIFO) and the cluster. In addition, it also collects the transactions into a block and then appends it to a Blockchain. Whenever an external device requires data from the network, the miner allocates a special key. The miner first checks the policy header and then allocates a key so that the devices can access the data. It can also declare the key invalid once the work is completed so that it may not able to access the network anymore. This method has two advantages – the miner can keep track of all the devices involved within the network and the communication between devices is secured using a shared key. Even access to local storage requires permission [15] and we can implement distributed cloud storage, making it difficult to cause disruptions [11]. IoT devices can carry out autonomous transactions through smart contracts. Combined with artificial intelligence (AI) and Big Data solutions, more significant impacts can be produced [18].

Fig. (1). Block diagram of BCT.

As depicted in Table 1, various types of BCT along with their attributes have been discussed. Blockchain checks each packet of data or transaction to identify any kind of abnormal behavior. If we take into consideration multiple miners to validate a new packet being added to the chain, it definitely increases the delay because now every miner has to verify the packet being added but it enhances the robustness of the entire network. It solves the problem of centralization as multiple miners control/validate the data being added. Blockchain requires each miner to do an encryption checking and solve a complex mathematical problem so as to complete a transaction, this can increase the energy consumption, but using

92 Cross-Industry Blockchain Technology

Sharma et al.

Artificial Intelligence, this problem can also be dealt with [19]. Blockchain can be the future of security since many new companies have started to use it to gain trust among their users, for example, Provenance. Major companies like Bosch and Cisco have started implementing the features of Blockchain for securing IoT applications. Blockchain is heavily involved with cryptocurrency. GridCoin and Ripple Labs find the exquisite implementation of Blockchain in financial services [20]. Table 1. Types of BCT. Attribute

Public BCT

Consortium BCT

Private BCT

Determining Consensus

Every Miner

Only selected ones Particular Institution

Read Request

Public

Public/Restricted

Public/Restricted

Immutability

Almost impossible to interfere

Can be interfered

Can be interfered

Efficiency

Truncated

Quite high

Quite High

Centralization

Nil

Embryonic

Yes

Process of Consensus (PoC)

No confirmation required

Requires Permission Requires Permission

IOT The way IoT has created a buzzword is quite commendable and has appeased many researchers. IoT is nothing but the interconnectivity of the objects with each other via internet. Not only it aims to unify everything under one umbrella but also tries to address the issue of not being able to control the things that surround us with just one click. There is no unique definition of IoT as depending on the need and reference it can be molded [21]. Furthermore, IoT has been successful in grasping the attention of the users, businessmen, authorities over the world to not only make this concept used in their respective domain but also to develop its fangs even deeper into the realm of knowledge. The first known application of IoT was a Coke Machine at Carnegie Melon University in early 1980s and since then its development just sky rocketed. For successful implementation of Internet of Things (IoT), the prerequisites are (a) Dynamic resource demand (b) Real time needs (c) Exponential growth of demand (d) Availability of applications (e) Data protection and user privacy (f) Efficient power consumptions of applications (g) Execution of the applications near to end users and (h) Access to an open and inter operable cloud system [22]. So far when we take major essential technologies widely used for deployment of IoT-based products and services, the most obvious solution we get are RFID, WSN, Middleware, Cloud Computing and IoT Application Software. The trend of

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 93

IoT prior from 2010 to 2020 is clearly illustrated in Table 2. Table 2. IoT trend Prior 2010

2010-2015

2015-2020

After 2020

Network (N/W)

▪ WSN based

▪ Autonomous ▪ N/W location transparency. ▪ Lag Accepted ▪ Storage and Power N/Ws ▪ Hybrid Technologies

▪ Awareness based on Context N/W.

▪ N/W Apprehension ▪ Autodidactic and Repairing N/Ws.

Software and Algorithms

▪ Amalgamation of relational database. ▪ IoT oriented. ▪ Event oriented platforms. ▪ Localization Algorithms.

▪ Wide Scale, open source ▪ Compose able Algorithms ▪ Next gen social oriented ▪ Next gen based apps

▪ Desired results oriented. ▪ Distributed AI ▪ Object-to- object collaboration

▪ User-based ▪ Transparent IoT ▪ Cinch to deploy ▪ Objects-to- human collaboration. ▪ For everyone.

Hardware

▪ RFIDs, sensors ▪ Integrated into smart phones. ▪ NFC in smart phones. ▪ Truncated and affordable MEMs technology

▪ Various protocols and standards oriented. ▪ Increased sensors and actuators. ▪ Secure affordable tags and

▪ Intelligent sensors ▪ Increased sensors truncated in a very small space.

▪ Nanotechnology and new innovative materials

Data Processing

▪ Spectrum aware ▪ Series and Parallel data processing ▪ Context based data ▪ Adaptive, AI based ▪ Quality of Service ▪ Context based data processing and cognitive optimization. (QoS) processing that is outputs. ▪ adaptable

Table 3. BCT addressing IoT challenges. Challenge Costs/Capacity constraints

Explanation

Blockchain Solution

With the sudden increase in the use of Smart contracts can enable smooth IoT, there will be a surge in the use of communication over the network. IoT Devices. More applications of IoT Decentralized approach will help in scalability in daily life involve the use of more and in security. devices .

94 Cross-Industry Blockchain Technology

Sharma et al.

(Table ) cont.....

Challenge

Traditional Methods

Dependency on Cloud

Mutability

Explanation

Blockchain Solution

Previous security methods work in centralized approach and can risk the Decentralized approach removes the reliability entire system’s security. Very less over one place. Data is approved from the scalability offered and no such users cryptographically before adding to the protection against malicious attacks chain so malware cannot be added. like DDoS. Malware can be Blockchain has been proven useful against introduced and whole network can get many malicious attacks. compromised Because of centralized approach any problem with the Cloud Servers will affect the entire network and the service will stop functioning.

No singular point of dependency. The data is distributed on the Cloud Servers. If any one server is down data can be sent on another server.

Data can be manipulated easily and even malware can be added to disrupt the entire service.

Immutable chain having timestamp on each block. No data can be added in between and without the encryption verification of all the users. Data is distributed over the cloud and cannot be tampered with because of encryption.

We, as humans have realized that nothing in this world can be considered perfect or achieving that Utopian world is just our dream, so we discuss about the challenges faced by IoT that are data management challenge, data mining challenge, privacy, chaos and lastly security (Table 3). BCT comes as a savior and this has been discussed in the latter half of the paper. Moreover, security goals are very much needed by every system and certain principles are to be followed that are confidentiality, integrity, availability, authentication, lightweight solutions, heterogeneity, policies, key management systems [23]. Integrated Solutions using BCT and IoT Digital innovation is the need of the hour and various new reforms are required in this field. Digital innovation is nothing but the use of digital technology for a wide range of innovations. The early history of institutional theory provided a particular version of change that organizations come to look more like each other because of the strength of legitimacy and socio-cultural pressures. A central process is that of isomorphism, that is, those organizations come to look more alike through normative, mimetic and coercive pressures. Studying digital innovation and transformation from an institutional perspective is about how digitally-enabled institutional arrangements emerge and diffuse both through fields and organizations. Similarly, ideas and key core concepts can be visualized in BCT amalgamated with IoT. Before diving into this cohesive concept, first let

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 95

us have a brief idea about what it has for us in its bag of surprises [24]. The Internet of Things (IoT) is cracking its shell and evolving into full maturity thus establishing itself as part of the future. As predicted by 2022, more than 18 billion devices will be available across the world and as IoT has been encompassing this world of technology is destined to create all the more new challenges in the IoT domain [25]. IoT is an underlying background for various devices that are responsible for generating and exchanging information as well as private sensitive information thus making it vulnerable to various cyber-attacks. Moreover, the new devices that are associated with IoT are light weight and have to devote most of their energy to multitasking and hence including BCT for IoT security is a unique yet effective way out. Blockchain can help in the enrollment of IoT devices and keep a regular integrity check on the devices [26]. IoT has a broad range of applications and with ever increasing demand in the devices and the availability of internet to every person has opened the doors to research and new development. Since the amplification of IoT features, it has led to some lacks and difficulties in its security and privacy that encompass various threats such as lack of central control, heterogeneity in device resources, multiple attack surfaces, context specific risks, and scale [27]. The ever increasing and now becoming the more ubiquitous, BCT has a good and a strong hold in the evolution and miniaturization of IoT that trace its path coming all the way from a very lame and conventional usage. This has not only resulted in a colossal advancement but also has led to various new emerging technologies like Wireless Sensors Network (WSNs), Radio Frequency Identification (RFID), etc. [28]. IoT has taken over the world suddenly and there is a huge amount of real time data being collected on a regular basis. The traditional methods cannot be efficient for such huge data and it is not a very good practice to store data directly on the cloud [11]. The data should be readily available, offer low latency and the devices should be scalable. The centralized data can be tampered easily and we can never be able to trust these IoT companies with our sensitive data. We need a distributed, decentralized system where every data being added or altered is first verified by all the systems in that network. In addition to this, the manifold and presence of IoT have led to an everincreasing demand of the Internet, security and many more important aspects, and the amalgamation of IoT with BCT now becomes a primary concern. IoT not only makes the users utilize the resources of it but even the creators of innovative application for end users also make BCT a perfect tool for aggravating the results. The most basic and foremost challenge of IoT is nothing but Security, or one can even call it as ‘privacy concern’. Since the integration of BCT and IoT has led to overcoming of this challenge hence centralized companies manage data and

96 Cross-Industry Blockchain Technology

Sharma et al.

privacy using the integration of both. BCT has the potential to overcome the challenges associated with IoT as a result of its distributed, secure, and private nature. As already discussed, Blockchain is a decentralized, immutable, transparent and secure ledger of all the information. Keeping in mind the benefits of BCT, more than 1.4 billion dollars were invested in BCT in the first 9 months of 2016 [29] and this number is still increasing exponentially. Blockchain is a sector still in development so there is still a room for a lot of improvements. Addition like ‘GHOST’ which will increase the block creation rates and we will be able to create large blocks of data [30]. The implementation of Content Distributed Network (CDN) will be able to increase the speed of data propagation in the BCT and thus will be able to remove any inconsistencies arising due to the distributed approach and also, it will protect the network from double-spent attacks [31]. Although adopting BCT directly for IoT is not so easy and straightforward as it encompasses various challenges like high resource demand, long latency and low scalability. Furthermore, taking into consideration the study conducted by Gartner, IoT security spending reached $1.5 billion in 2018, and by 2022, half of all security budgets for IoT reached to fault remediation, recalls and safety failures rather than protection. Hence if a ‘secure by design’ system is achieved, IoT will experience an exponential increase in its advancement. The need for BC arrives from the essential challenge faced by IoT is in its distributed architecture that may lead to various problems like security, exploitation via cyber-attacks, collapsing quickly, mismanagement of central cloud service provider, confidentiality and authentication, keeping the data integrity, and many more. In addition to this, one more example bolsters the idea of amalgamation of BCT with IoT, Big chain DB being the one that combines the benefits of Blockchain with Big Data [32]. Using Blockchain with Artificial Intelligence (AI) will reduce the computation overload by its operations on the data [19]. IoT is the connectivity of everyday devices with one another using various techniques. IoT can range from being as simple as switching on the coffee machine as soon as our car enters the garage to be able to monitor a person’s vitals in healthcare and provide this information for further analysis. Companies are investing billions on the Industrial Internet of Things for industrial applications and tackling their problems [33]. Due to the increased application of IoT and its ability of being able to monitor real time data, it is vulnerable to attacks and security issues on the devices connected to the cloud we are storing the data in. Our device signals operate in public place that exposes them to hackers and they can damage the devices or gain control of the data being sent easily. Moreover, it is already vulnerable to network layer attacks like DoS, illegal access networks, Man in the middle attack and this list continues. On the storing side we can have threats related to illegal access of data,

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 97

malware or tampered data being stored and sometimes even data loss [34]. Furthermore, BCT has proved that it is immutable, distributed and immune against most of the attacks involving fraud and mainly double spending and record hacking. To explain the term coined as Double spending, it is when a party buys multiple assets using one pool of one because there is some delay involved in processing the payment. Blockchain requires the miners to solve a PoW before confirming any transaction that takes some time. This gives time for the payment processing to take place and thus tackles the problem easily. BCT’s decentralized approach protects from hacking the data stored [35]. DDoS attacks are being handled using the decentralized approach and the Gladius project’s approach is focused on stopping DDoS attacks [36]. IoT network involves a lot of sensors spread over a large area to monitor it in its entirety. We do not use point to point connection because it does not help in modularity, decentralization and reduces the scalability of the network. IoT network consists of a controller as well as actuator nodes which help a lot in making the system automated. IoT network generates a large amount of data and it results in some delays and makes it difficult to manage the network. Using blockchain along with an adaptive control algorithm, a lot of these problems can be solved. Adaptive control algorithm analyzes the queue and does not allow the queue to be saturated by making suitable changes. Blockchain enhances the security and stores the HashMap that helps in quick searching in the database, thus increasing the efficiency of the IoT network. The ability to create/store/transfer digital assets in a distributed, decentralized and tamper-proof way is of great practical value for IoT systems. Performance analysis clearly shows that latency is a dominant factor in this region [37]. Simultaneously an ever-increasing boost in IoT and BCT amalgamation, these two concepts under one umbrella have taken a huge step forward as main standards for low-power lossy-networks (LLNs) have constrained resources. The future significance of this amalgamation is quite evident as not only being useful for commercial aspects, it also finds its significance in community services [38]. Comprehending conventional issues faced by IoT, they can be listed as ‘Resource Consumption, Centralization, Lack of Privacy, Not Scalable, Mutable, etc.’ and these issues then make BCT shine as a savior for IoT drawbacks [39]. Hence, the primary objective of integrating BCT with IoT is just to make all these challenges vanish or reduce to a very negligible content. One should never confuse BC with Bit coin or more broadly speaking with crypto currency, as it is just an application or leverage of BCT. BC to be put into a simple statement, it is just a distributed database system based on a consensus rule that allows the

98 Cross-Industry Blockchain Technology

Sharma et al.

transfer of value between entities. BC being the only one entity that simultaneously enjoys three properties: a. Trust-less meaning no need to own a certified digital identity and both the involved parties have no need to know about each other but still can exchange data. b. Permission-less meaning nobody has the authority to operate the BC network, hence no permissions no controllers. c. Censorship resistant meaning anyone can use and negotiate on BC [40]. It can be concluded that an IoT ecosystem has numerous vulnerabilities. BCT comes as a rescuer and thus paves the path for many futuristic development and researches. Huge amount of research can be done even in very specific domains like Smart Energy, Smart Manufacturing, Data privacy and what not. With the ubiquity of IoT devices and increasing production of data, attempts have started to monetize the data giving birth to the machine economy. BC can streamline the negotiation processes, eliminating the need for a trusted intermediary. Advocating the same notion, the advancement and gaining of attention of IoT and BCT, the amalgamation is unavoidable. It is always expected that BCT will revolutionize IoT and the adoption of regulations is the key for inclusion of BCT and the IoT as part of government infrastructure. BCT and IoT Integrated for Healthcare Healthcare is the one industry that is destined to proliferate with such an exponential rate, that in the coming future, it will be the one with most name and fame. The way the entire sector is going to revolutionize, is surely destined to bring laurel to researchers and enthusiasts devoting their entire time to bring God’s plan to existence. Healthcare has come a long way from where it started. If we look at the trend of healthcare, right from using herbs for everything and then for using chemical medicines for treating various diseases, healthcare surely has taken a turn. The wars in some way made countries realize that they need to focus more on the health of fellow soldiers. New methods were being implemented - using penicillin to reduce the infection severity and spread, which eventually led to its mass production in the coming years. Further, more advances were made in the field of healthcare – the polio vaccine (1952), the first successful kidney transplant (1954), antiviral drugs (1960), and Immunotherapy (1970s) [41]. It was in the early 1960s when the concept of Problem-Oriented Medical Records (POMR) originated by Dr. Lawrence L Weed. It was a breakthrough in the research sector

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 99

for medical sciences because now all the data about a particular topic was available in one place and this method changed the entire perception of the research team. A separate database for each patient was created consisting of problems, the treatment undergone and the test reports which would help in carrying the treatment further [42]. So far, we have discussed about the key features of BCT and IoT and how their independency can open the doors to new technological advancements. The main focus of this section is to take consideration of bringing BCT, IoT and Healthcare Sector under one page. In the coming years, the healthcare model is going to become more patient-centered. We will seek progress on effectiveness and safety of the patients and their sensitive data [43]. In the recent year, the spread of COVID-19 has made us focus on healthcare for everyone. We have to reduce contact so the traditional methods do not fit well here. We need to be able to collect data of the people and be able to access it remotely to understand which area is more affected with the pandemic and the POMR was also being collected to understand the disease better. More emphasis is being laid on being able to collect this data through IoT rather than physically. Infected person’s record is being analyzed and the places they visited were being quarantined to prevent any kind of spread [44]. Applications are developed to help in locating people to alert them about their environment and at the same time, their privacy needs to be safeguarded too. Using BCT, we can increase the efficiency of the transfer of this data and ensure the safety of this data from attackers. IoT will help in the wireless transmission of the data being collected and BCT will ensure that this data is not tampered with. BCT creates a ledger of all the transactions taking place and we will be able to identify every chunk of data being added and the users connected to this data [45]. With an exponential increase in the sector of healthcare, healthcare insurance and other important aspects related to the same have now become an indispensable part of human lives hence leading to an enormous collection of medical data. This data may comprise diagnosis and treatment processes, wearable technology data, records, and history of patient’s data thus leading to an inevitable use of BCT and IoT for analyzing and securing this very important data. Since our generation has witnessed billions of sensors amalgamated with various other devices, hence keeping a record and analyzing this data has now become an indispensable job that surely requires huge attention and all the more security and privacy and this can only be achieved by deploying BCT and IoT in it. If this medical data so collected is not available at the right moment or there is even a significant amount of delay in the reception of this data, it may lead to a delay in the treatment process and much worse even lead to endangering the patient’s life [8].

100 Cross-Industry Blockchain Technology

Sharma et al.

Along with huge applications and a wide horizon of IoT, a huge trend is also visible in the healthcare sector and even a good deal of emphasis is also given to Wireless Body Area Networks (WBANs). Mainly in WBAN, a patient is equipped with various health wearable gadgets specifically dedicated for the tracking and measurement of various real-time specifications of health like heart rate, pulse rate, glucose level, etc. All these gadgets are controlled or supported by a master device (like a smartphone) that works autonomously and sends this data to a trustworthy health care service provider. Not only does this help in reducing doctor’s appointment but also help the patient to live a healthy life with utmost caution. The popularity of these devices has taken an exponential growth path as predicted to reach almost 50 million by 2021. As this realm of remote patient monitoring expands, obviously the need for a more safe and secure transmission of this data also increases. The best manager for this type of work is none other than BCT, as this medical data is quite lucrative for hackers [46]. Internet of Medical Things (IoMT) will revolutionize healthcare in the coming years. IoMT is a combination of IoT with medical sector enabling medical devices, software and health systems. Again for analyzing the same, it involves WBAN whereby using wearable devices we will be able to monitor the vitals of a patient remotely and even can provide this information to a healthcare center for further evaluation. We will be able to treat patients even in their homes using these devices. This will improve the patient flow in the hospital and will enable the medical team to treat more patients. Traditional healthcare methods are moving toward digitization using IoT-enabled devices [47]. This method of remote monitoring will not only assist the patients and save them from visit, saving time for both the medical team and the patient but can save up to 300 billion dollars for a country like America, according to Goldman Sachs [48]. Imagine the impact it can have on other countries! IoMT faces an issue in security and vulnerability because of its diversity and wireless approach which can be handled using BCT. BCT network can play a role as a middleware, being able to allocate resources in an efficient way [49]. So, to make the life of hackers miserable, or to bring all their plans to a dead end, a sophisticated framework powered via BCT can be designed. BCT is also capable of implementing smart contracts, which are pieces of code that can automatically execute based on predefined conditional triggers and these triggers can be designed as per the need and condition of the patient. In addition to this, while confronting Protected Health Information (PHI), privacy and authenticity are quite essential and the tool useful for this is BCT as no confidential medical information will be stored in BCT or in those smart contracts; all the measurements themselves will be forwarded to designated storage database. These types of authentications are not only helpful in preventing and detecting alterations but also in rectifying these alterations if happens due to any accident or

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 101

purpose. BCT having the potential to improve security in remote patient monitoring systems thus automates the delivery of health-related notification for compliant issues. It can fix current problems with poorly managed patient data by adding formatted and clean data to EHRs and healthcare data lake, allowing healthcare to utilize Big Data with more reliable information, leading to more significant results. BCT can help in security because of its natural properties of decentralization, immutability and as mentioned earlier it has been proved successful against different malicious attacks. BCT can offer privacy because all the transactions are saved with an encryption key so the attackers will not be able to locate the source of the data. Timestamps in the blocks would not allow anyone to add any data in between, thus highlighting immutability of BCT [50]. BCT can be beneficial in transferring the data as well. There will be no data loss, more integration and security of the data. Data being added requires verification from other nodes in the network so any malware will not be able to creep its way [51]. One can even think of applying the key ideas of BCT to a health application network where the collected data can be used to generate important alerts to authenticated healthcare service providers in a very secure, robust and private manner. It is clear so far that a variety of smart IoT devices are used in a sandwiched form of layers of Internet. From these layers, data is collected, analyzed and henceforth subjected to use for health care service providers. Since IoT devices are lightweight and have shallow footprints so often tend to leave very shallow energy footprints. This small amount of energy is not feasible for the tasks involving security or privacy, hence BCT comes into picture. IoT has a lot of demerits but its extensive use often sometimes leads to some scalable approach and many a times, it may become quite challenging and thus deploying BCT can turn out to be a very profitable deal [52]. The year of 2020 undoubtedly has been full of surprises and unseen circumstances, but the world has been definitely pushed back in terms of progress by the virus, COVID-19. The unprecedented flow of this virus has given rise to various challenges especially in the healthcare sector and thus technological advances have to shine as a savior for humankind and these advances are nothing but novel technologies, such as AI, BCT, ML and IoT. On a keynote, BCT has been discovered by the European Parliamentary Research Service (EPRS) as one of the key novel technologies to fight COVID-19. Out of all the key traits possessed by BCT, when amalgamated with IoT, it can progress greatly to overcome all the ordeal put forward by this virus. This umbrella can be expanded to various applications such as contact tracing, patient information sharing, supply change management, e-governance, disaster relief and insurance, online

102 Cross-Industry Blockchain Technology

Sharma et al.

education, various autonomous services, manufacturing industry, agriculture and food distribution [53]. So far, we have looked at the possible outcomes or the domains where the three majors of our topic come under a single umbrella but what still remains archaic is the authenticity and security of the data that will still prevail if the system or the framework supporting the entire network is not BCT equipped. Moreover, what still is detrimental is the cyber-attack and frequent attacks on the health care systems leading to devastating data loss. So, when the entire data is handled with a quite robust, immutable, non-hackable system, it will not only be helpful for the healthcare department or the organization but even the system now will be responsible for the patient’s personal data loss. If the system now handling this entire framework is storing the data in an encrypted format, even if the system somehow gets shut down or faces any technical glitch still the data will be protected and stored in a secure place [54]. In the year of 2020, the number of setbacks that were faced was numerous but if one asks any digital enthusiast that what led to the digital transformation of their company, a sheer answer would be COVID-19. The development of various smart apps like Aarogya Setu, Kwarantannadomowa, Trace Together, LetsBeatCOVID, COVID Watch, etc. was inspired by the amalgamation of IoT and BCT and definitely the other novel technologies so far discussed such as the reliable sharing of data, patient monitoring, and checking the dues so provided to the patient can be simply powered by BCT running in the backhand. Moreover, it can be useful in providing transparency to the users as well [55]. Although this pandemic did bring several limitations, but it also opened doors for many digital innovations. Moreover, in the past years, it has been visualized that even checking for occupancy may lead to errors thus a framework can be proposed to protect the data that shall be collected from this occupancy. The data so collected can then further be provided to the requisite stakeholders for more cognitive research works [56]. Taking into consideration today’s scenario, the medical field is considered to be quite complex, significant and rapidly growing and a huge amount of funds are utilized in this field. A prominent example of which can be seen for COVID-19. Undoubtedly multimedia has taken an intricate form where there exists a tremendous amount of symbiotic relationship between the two, from improving the quality of the interaction of patients with the healthcare service providers and transferring the patient’s data in various forms such as images, texts and audio via online using various smart objects. But if we look at this whole picture very closely, we’ll notice that managing the entire data is not easy as it not only has storage issues but human efforts and security risks are quite formidable. Threats

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 103

occurring in these IoT devices are also initiated by various intruders that may lead to leakage and misuse of the data of patient. In order to overcome all the above stated issues, BCT can be effectively deployed as it not only provides a secure framework, but also protects the entire control system in real-time scenario. When the entire result was simulated, a sheer peak of 86% success rate was seen within the first deployment of BCT that covered various aspects like product drop ratio, falsification attack, worm-hole attack, and probabilistic authentication scenarios [57]. IoT applications and healthcare system use a very refined interconnected device eco system for the betterment of the healthcare facilities. We are quite familiar that persons suffering from chronic illness often use up the healthcare services more often than any non-chronic diseased person and that leads to a creation of an immutable stamp of the records associated with the former patients. Despite all the technological advancements more or less, still setting up of a universal coding language or common communication protocol for this eco system still remains elusive. Hence a system is laid out that ensures that IoT systems with improved interoperability can also secure and guarantee confidentiality between nodes in that particular infrastructure and thus trusting the entire workload to BCT make the entire system, more efficient [58]. Table 4 provides the comparison of previous studies which integrated blockchain and IoT for solving problems in healthcare. Table 4. Table of comparison for healthcare. S. No.

Problem Statement

Solution Proposed

References

1.

There was no record of the Developing a Problem Oriented Medical Record problems being encountered and the capable of storing medical data and easily solutions proposed for them by the accessible by the medical team and researchers medical staff. from any place.

[42]

2.

Medical insurance and high production of Earlier, healthcare was totally necessary drugs. Introduction of automated different from what we see today. systems in healthcare helped a lot in keeping track Prices were rising, less medical staff of the patients. Artificial intelligence and machine to attend the patients and so on. learning will shape the future

[43]

3.

Sudden introduction of Coronavirus and its features. Its direct attack on our respiratory system and no way to tackle it.

Coming up with a method to be able to tackle the problem efficiently without risking the lives of others. A quarantine and continuous monitoring of the patient. Using face masks to protect from the virus’ spread.

[44]

104 Cross-Industry Blockchain Technology

Sharma et al.

(Table ) cont.....

S. No.

Problem Statement

Solution Proposed

References

4.

Using Fog Computing to be able to store and Lack of trust in sharing secure manage all the devices connected in the network. information through IoT and Using cloud computing to store the data securely. network not being efficient enough Implementation of Blockchain along with fog and to be able to handle the flow and cloud to create a Hyperledger of data and enhance storage of data. the security.

[45]

5.

The security and privacy problems related to medical data, their reception, the delay encountered.

A novel framework of modified BCT model using requisite IoT devices, relying on distributed nature and other additional privacy and security properties for the same.

[8]

6.

Exponential increase in IoT devices resulting in increased security concerns for transfer and logging of data.

BCT based smart contracts, based on Ethereum protocol, for facilitating the protected health information (PHI) hence providing real-time patient monitoring and medical interventions.

[9]

7.

Using the Internet of Things with medical devices Increase in the burden on medical to be able to keep track of patient easily. Creating staff because of keeping regular wearable devices to be able to monitor patient track of every patient. Frequent wherever they are. Medical personnel can easily visits of a person for treatments and manage multiple patients and patient’s visits to keeping vitals in check. hospitals will be reduced.

[47]

8.

Expensive medical facilities and reducing pressure on the medical staff.

Goldman Sachs believes that digital healthcare can save a lot of money. It can reduce the efforts from both sides and make lives easier. Medical staff can easily keep track of “high risk patients”.

[48]

9.

Tackling the sudden burst of coronavirus and be able to track it down. Ensure safety for healthcare professionals.

Using sensors to be able to track everyone’s vitals and detect any positive cases as well as using sensors to monitor the patients without being too close to them. Address the security of this sensitive information using Blockchain and be able to store the data securely.

[49]

10.

Current methods being used in collecting and storing medical data not being.

Using Blockchain, digest chain and secured P2P networks to address most of the issues being faced.

[50]

The previous methods were very Using Blockchain and Deep Learning to create a slow and not that secure in case of model able to transfer the data more efficiently 11. transfer of medical data and making and securely. It will lead to reliable data analysis this data available for anyone who and make the data immutable and accurate. Thus, required it. leading to correct diagnosis of the patient.

[51]

A novel BCT based model optimized for IoT devices taking into consideration the healthcare facilities by implementing lightweight BCT thus increasing privacy and security.

[52]

12.

To overcome the issues faced with IoT like very low scalability, high resource demand, traffic overload.

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 105

(Table ) cont.....

S. No.

Problem Statement

Solution Proposed

References

13.

The impact of COVID-19 on world and thus the challenges so encountered.

Inculcating BCT as a key enabling technology and thus presenting a high-level view of BCT depicting how it can be leveraged.

[53]

14.

The increased interest of hackers in Patient centric data management system powered cyber-attacks especially in by BCT to attain privacy. Cryptographic functions healthcare big data. are used to protect patient’s data.

[54]

15.

Constructing a framework for A framework or rather four-layer architecture was COVID-19 monitoring and seeking developed for assisting people regarding this information for the same via pandemic using IoT and BCT through smart devices. internet.

[55]

16.

Monitoring and Tracking real time occupancy for COVID-19 in order to ensure Public Safety

A novel occupancy system that allows estimation using a precise technique that is based on autonomous wireless devices.

[56]

17.

Management of huge amount of health data leads to increase in human efforts and potential risks.

A security framework of preserving healthcare multimedia through BCT has been developed with a success rate of 86%.

[57]

18.

Lack of proper semantics in IoT healthcare mainly dealing with confidentiality, accessibility, and reliability.

A BCT decentralized Interoperable Trust framework for IoT healthcare that overcomes the drawbacks of IoT healthcare.

[58]

CONCLUSION Technological advancements are the key milestones in mapping any sector’s progress. When we map the way all these technological advancements have taken a turn, we realize that IoT integrated with BCT was not a new thing to be surprised of, rather being the need of the hour it surely has taken away the scientific sector with a blow. Realizing the advancement in health sectors, with BCT even sharpening its fangs did also open the way for enthusiasts and research scholars to invent and explore this amalgamated form. This review tries to inculcate all these reforms as well and lays a fundamental futuristic approach for developing all the more new frameworks and applications that extract out the best from BCT IoT into the healthcare sector. Undoubtedly, consolidating these entire concepts into one is not everyone’s cup of tea but once done, opens up the way to discover and become the necessity of invention. This world is surely about to transform into a virtual world, although it has already taken this path, certain resistances are nevertheless offered but with this unanimous working of BCT and IoT and that too in healthcare can surely reform the entire vision of this journey.

106 Cross-Industry Blockchain Technology

Sharma et al.

CONSENT FOR PUBLICATION Not applicable. CONFLICT OF INTEREST The authors declare no conflict of interest, financial or otherwise. ACKNOWLEDGEMENT Declared none. REFERENCES [1]

A. D. Dwivedi, L. Malina, P. Dzurenda, and G. Srivastava, "Optimized Blockchain Model for Internet of Things based Healthcare Applications", In: 42nd International Conference on Telecommunications and Signal Processing (TSP). Budapest: Hungary, 2019, pp. 135-139. [http://dx.doi.org/10.1109/TSP.2019.8769060]

[2]

Sheldon Greenfield, and Eugene C. Nelson, "Recent developments and future issues in the use of health status assessment measures in clinical settings", Medical Care, vol. 30, no. 5, pp. MS23-MS41, 1992. JSTOR. www.jstor.org/stable/3766227

[3]

U.A.K. Betz, F. Betz, R. Kim, B. Monks, and F. Phillips, "Surveying the future of science, technology and business – A 35 year perspective", Technol. Forecast. Soc. Change, vol. 144, pp. 137-147, 2019. [http://dx.doi.org/10.1016/j.techfore.2019.04.005]

[4]

F. Jiang, Y. Jiang, H. Zhi, Y. Dong, H. Li, S. Ma, Y. Wang, Q. Dong, H. Shen, and Y. Wang, "Artificial intelligence in healthcare: past, present and future", Stroke Vasc. Neurol., vol. 2, no. 4, pp. 230-243, 2017. [http://dx.doi.org/10.1136/svn-2017-000101] [PMID: 29507784]

[5]

T. Sloan, A. Fitzgerald, K.J. Hayes, Z. Radnor, S.R.A. Sohal, and A. Sohal, "Lean in healthcare – history and recent developments", J. Health Organ. Manag., vol. 28, no. 2, pp. 130-134, 2014. [http://dx.doi.org/10.1108/JHOM-04-2014-0064] [PMID: 25065106]

[6]

E.M. Goldner, E.K. Jenkins, and B. Fischer, "A narrative review of recent developments in knowledge translation and implications for mental health care providers", Can. J. Psychiatry, vol. 59, no. 3, pp. 160-169, 2014. [http://dx.doi.org/10.1177/070674371405900308] [PMID: 24881165]

[7]

Arvind Kasthuri, "Challenges to healthcare in India", Indian Journal of Community Medicine., vol. 43, no. 3, pp. 141-143, 2018. [http://dx.doi.org/10.4103/ijcm.IJCM19418] [PMID: 6166510]

[8]

A. Dwivedi, G. Srivastava, S. Dhar, and R. Singh, "A Decentralized Privacy-Preserving Healthcare Blockchain for IoT", Sensors (Basel), vol. 19, no. 2, p. 326, 2019. [http://dx.doi.org/10.3390/s19020326]

[9]

K.N. Griggs, O. Ossipova, C.P. Kohlios, A.N. Baccarini, E.A. Howson, and T. Hayajneh, "Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring", J. Med. Syst., vol. 42, no. 7, p. 130, 2018. [http://dx.doi.org/10.1007/s10916-018-0982-x] [PMID: 29876661]

[10]

S. Jiang, J. Cao, H. Wu, Y. Yang, M. Ma, and J. He, "BlocHIE: A BLOCkchain-Based Platform for Healthcare Information Exchange", IEEE International Conference on Smart Computing (SMARTCOMP), pp. 49-56, 2018. [http://dx.doi.org/10.1109/SMARTCOMP.2018.00073]

IoT Healthcare-based Blockchain Solutions

Cross-Industry Blockchain Technology 107

[11]

Pradip Sharma, Mu-Yen Chen, and Jong Park, "A software defined fog node based distributed blockchain cloud architecture for IoT", IEEE, 2017. [http://dx.doi.org/10.1109/ACCESS.2017.2757955]

[12]

N.M. Kumar, and P.K. Mallick, "Blockchain technology for security issues and challenges in IoT", Procedia Comput. Sci., vol. 132, pp. 1815-1823, 2018. [http://dx.doi.org/10.1016/j.procs.2018.05.140]

[13]

Z. Zheng, S. Xie, H.N. Dai, X. Chen, and H. Wang, "Blockchain challenges and opportunities: a survey", Int. J. Web Grid Serv., vol. 14, no. 4, pp. 352-375, 2018. [http://dx.doi.org/10.1504/IJWGS.2018.095647]

[14]

A. Dorri, S. Kanhere, and R. Jurdak, "Blockchain in internet of things: Challenges and Solutions", ArXiv, abs/1608.05187, 2016.

[15]

A. Dorri, S. Kanhere, R. Jurdak, and P. Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home", IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618-623, 2017. [http://dx.doi.org/10.1109/PERCOMW.2017.7917634]

[16]

M. Nofer, P. Gomber, O. Hinz, and D. Schiereck, "Blockchain", Bus. Inf. Syst. Eng., vol. 59, no. 3, pp. 183-187, 2017. [http://dx.doi.org/10.1007/s12599-017-0467-3]

[17]

X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, "A survey on the security of blockchain systems", Future Gener. Comput. Syst., vol. 107, pp. 841-853, 2020. [http://dx.doi.org/10.1016/j.future.2017.08.020]

[18]

N. Kshetri, "Can Blockchain Strengthen the Internet of Things?", IT Prof., vol. 19, no. 4, pp. 68-72, 2017. [http://dx.doi.org/10.1109/MITP.2017.3051335]

[19]

S.K. Singh, S. Rathore, and J.H. Park, "BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence", Future Gener. Comput. Syst., vol. 110, pp. 721-743, 2020. [http://dx.doi.org/10.1016/j.future.2019.09.002]

[20]

Marc Pilkington, "Blockchain Technology: Principles and Applications (September 18, 2015)", Research Handbook on Digital Transformations, F. Xavier Olleros and Majlinda Zhegu (eds.). Edward Elgar, 2016, Available at SSRN: https://ssrn.com/abstract=2662660.

[21]

R. Casado-Vara, P. Chamoso, F. De la Prieta, J. Prieto, and J.M. Corchado, "Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management", Inf. Fusion, vol. 49, pp. 227-239, 2019. [http://dx.doi.org/10.1016/j.inffus.2018.12.007]

[22]

I. Lee, and K. Lee, "The Internet of Things (IoT): Applications, investments, and challenges for enterprises", Bus. Horiz., vol. 58, no. 4, pp. 431-440, 2015. [http://dx.doi.org/10.1016/j.bushor.2015.03.008]

[23]

T. Yousuf, R. Mahmoud, F. Aloul, and I. Zualkernan, "Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures", International Journal for Information Security Research, vol. 5, no. 4, pp. 608-616, 2015. [http://dx.doi.org/10.20533/ijisr.2042.4639.2015.0070]

[24]

B. Hinings, T. Gegenhuber, and R. Greenwood, "Digital innovation and transformation: An institutional perspective", Inf. Organ., vol. 28, no. 1, pp. 52-61, 2018. [http://dx.doi.org/10.1016/j.infoandorg.2018.02.004]

[25]

O. Novo, "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT", IEEE Internet Things J., vol. 5, no. 2, pp. 1184-1195, 2018. [http://dx.doi.org/10.1109/JIOT.2018.2812239]

108 Cross-Industry Blockchain Technology

Sharma et al.

[26]

D. Li, W. Peng, W. Deng, and F. Gai, "A blockchain-based authentication and security mechanism for IoT", 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1-6, 2018. [http://dx.doi.org/10.1109/ICCCN.2018.8487449]

[27]

A. Dorri, S. Kanhere, and R. Jurdak, "Towards an Optimized BlockChain for IoT", IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 173-178, 2017. [http://dx.doi.org/10.1145/3054977.3055003]

[28]

Ana Reyna, Cristian Martin, Jaime Chen, Enrique Soler, and Manuel Diaz, "On blockchain and its integration with IoT - challenges and opportunities", Future Generation Computer Systems, vol. 88, pp. 173-190, 2018.

[29]

J. Kennedy, 1.4bn investment in blockchain start-ups in last 9 months, says PwC expert. Silicon Republic, 2016.

[30]

Y. Sompolinsky, and A. Zohar, "Accelerating Bitcoin's transaction processing", Fast Money Grows on Trees, Not Chains. IACR Cryptol. ePrint Arch., p. 881, 2013.

[31]

Chrysoula Stathakopoulou, "Faster bitcoin network", ETH Zurich. 32 – Features and Use Cases of Big Chain DB, 2015.

[33]

S. Vashi, J. Ram, J. Modi, S. Verma, and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues", International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 492-496, 2017. [http://dx.doi.org/10.1109/I-SMAC.2017.8058399]

[34]

J. Tailor, and A.D. Patel, "Comprehensive Survey on Security Problems and Key Technologies of the Internet of Things (IoT)", International Journal of Research and Scientific Innovation 4 (VIS), pp. 107-110, 2017.

[35]

J.J. Xu, "Are blockchains immune to all malicious attacks?", Financial Innovation, vol. 2, no. 1, p. 25, 2016. [http://dx.doi.org/10.1186/s40854-016-0046-5]

[36]

Antonio Maderia, Gladius: How Blockchain Technology Is Making the Web Safer and Faster. Bitcoinist, 2017.

[37]

M. Samaniego, U. Jamsrandorj, and R. Deters, Blockchain as a Service for IoT., vol. 433-436, pp. 433-436, 2016. [http://dx.doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102]

[38]

M.A. Khan, and K. Salah, "IoT security: Review, blockchain solutions, and open challenges", Future Gener. Comput. Syst., vol. 82, pp. 395-411, 2018. [http://dx.doi.org/10.1016/j.future.2017.11.022]

[39]

A. Dorri, S.S. Kanhere, R. Jurdak, and P. Gauravaram, "LSB: A lightweight scalable blockchain for IoT security and anonymity", J. Parallel Distrib. Comput., vol. 134, pp. 180-197, 2019. [http://dx.doi.org/10.1016/j.jpdc.2019.08.005]

[40]

A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, "Blockchain and IoT Integration: A Systematic Survey", Sensors (Basel), vol. 18, no. 8, p. 2575, 2018. [http://dx.doi.org/10.3390/s18082575] [PMID: 30082633]

[41]

Monique Ellis, "Medical advances in history. Procinical", Top (Madr.), p. 10, 2017.

[42]

A. Wright, D.F. Sittig, J. McGowan, J.S. Ash, and L.L. Weed, "Bringing science to medicine: an interview with Larry Weed, inventor of the problem-oriented medical record", J. Am. Med. Inform. Assoc., vol. 21, no. 6, pp. 964-968, 2014. [http://dx.doi.org/10.1136/amiajnl-2014-002776] [PMID: 24872343]

[43]

Corinne M. Karuppan, Nancy E. Dunlap, Michael R. Waldrum, and Kathleen M. Sutcliffe,

IoT Healthcare-based Blockchain Solutions Cross-Industry Blockchain Technology 109 Healthcare- Past, Present and Future. Operations Management in Healthcare. Springer Publishing Company, 2016. [http://dx.doi.org/10.1891/9780826126535.0001] [44]

T. Singhal, "A Review of Coronavirus Disease-2019 (COVID-19)", Indian J. Pediatr., vol. 87, no. 4, pp. 281-286, 2020. [http://dx.doi.org/10.1007/s12098-020-03263-6] [PMID: 32166607]

[45]

T. Alam, "IoT-Fog: A communication framework using blockchain in the internet of things", International Journal of Recent Technology and Engineering (IJRTE), vol. 7, pp. 833-838, 2019.

[46]

Y. Chen, S. Ding, Z. Xu, H. Zheng, and S. Yang, "Blockchain-based medical records secure storage and medical service framework", J. Med. Syst., vol. 43, no. 1, p. 5, 2019. [http://dx.doi.org/10.1007/s10916-018-1121-4] [PMID: 30467604]

[47]

"Alliance of Advanced BioMedical Engineering, Frost & Sullivan", Internet of Medical Things Revolutionizing Healthcare. Accessed: Jul. 19, 2020. [Online]. Available: https://aabme.asme.org/posts/internetof-medical-things-revolutionizing-healthcare

[48]

Corey Stern, Goldman Sachs says a digital healthcare revolution is coming - and it could save America $300 billion. Business Insider India, 2015.

[49]

H-N. Dai, M. Imran, and N. Haider, "Blockchain-Enabled Internet of Medical Things to Combat COVID-19", IEEE Internet of Things Magazine, vol. 3, no. 3, pp. 52-57, 2020. [http://dx.doi.org/10.1109/IOTM.0001.2000087]

[50]

B. Shen, J. Guo, and Y. Yang, "MedChain: Efficient Healthcare Data Sharing via Blockchain", Appl. Sci. (Basel), vol. 9, no. 6, p. 1207, 2019. [http://dx.doi.org/10.3390/app9061207]

[51]

D. Rakic, "Blockchain technology in healthcare", ICT4AWE, 2018.

[52]

A. Dwivedi, L. Malina, P. Dzurenda, and G. Srivastava, "Optimized Blockchain Model for Internet of Things based Healthcare Applications", 42nd International Conference on Telecommunications and Signal Processing (TSP), pp. 135-139, 2019. [http://dx.doi.org/10.1109/TSP.2019.8769060]

[53]

Anshuman Kalla, Tharaka Hewa, Raaj Mishra, Mika Ylianttila, and Madhusanka Liyanage, The Role of Blockchain to Fight against COVID-19. IEEE Engineering Management Review. PP, 2020. [http://dx.doi.org/10.1109/EMR.2020.3014052]

[54]

A. Omar, S. Rahman, A. Basu, and S. Kiyomoto, "MediBchain: A blockchain based privacy preserving platform for healthcare data", Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer International Publishing, vol. 3, no. 3, pp. 534-543, 2017. [http://dx.doi.org/10.1007/978-3-319-72395-2_49]

[55]

T. Alam, Benaida, Mohamed, Internet of Things and Blockchain-Based Framework for Coronavirus (COVID-19) Disease (April 25, 2022). International Journal of Online and Biomedical Engineering (iJOE), Forthcoming , Available at SSRN: https://ssrn.com/abstract=3660503 or http://dx.doi.org/10.2139/ssrn.3660503

[56]

T.M. Fernández-Caramés, I. Froiz-Míguez, and P. Fraga-Lamas, "An IoT and blockchain based system for monitoring and tracking real-time occupancy for COVID-19 public safety", Engineering Proceedings., vol. 2, p. 67, 2020. [http://dx.doi.org/10.3390/ecsa-7-08207]

[57]

G. Rathee, A. Sharma, H. Saini, R. Kumar, and R. Iqbal, "A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology", Multimedia Tools Appl., vol. 79, no. 1516, pp. 9711-9733, 2020. [http://dx.doi.org/10.1007/s11042-019-07835-3]

[58]

Eman Abou-Nassar, Abdullah Iliyasu, Passent Elkafrawy, Oh-Young Song, Ali Bashir, and Abd ElLatif, "DITrust Chain: towards blockchain-based trust models for sustainable healthcare IoT systems", IEEE access., 2020. [http://dx.doi.org/10.1109/ACCESS.2020.2999468]

110

Cross-Industry Blockchain Technology, 2022, 110-118

CHAPTER 6

Blockchain Technology-based System in Vehicular Ad-hoc Network Manoj Sindhwani1, Charanjeet Singh1,* and Rajeshwar Singh2 1 2

Lovely Professional University, Phagwara, Punjab,, India Doaba Group of Colleges, Nawanshar, India Abstract: Among the various technologies that are constructing the pillars deep in the field of engineering, ad-hoc networks are one of the major fields of research. On the grounds of history, Mobile ad-hoc Networks (MANETs) played a prominent role in battlefield communication and other important applications, but another emerging network named as Vehicular ad-hoc Networks (VANETs) offered wireless communication led to its popular usage that resulted in the major deployment of adhoc networks. However, in VANET, secure message transmission is still a challenge, so we propose a local blockchain to disseminate the message in vehicular networks to improve the security issues. The public blockchain technique in VANET ensures trustbased secure message transmission in the Vehicular ad-hoc Network.

Keywords: Blockchain, Message dissemination, Secure Network, Vehicular Networks. INTRODUCTION Ad-hoc is derived from a Latin word that signifies ‘formed for’. A network [1] consisting of various independent individual devices sharing and exchanging information for communicating with each other resulting in the formation of a multi-hop radio network is termed as ad-hoc network. During communication, if one party, who is interested in communicating with the other party that is far away, needs an intermediary to exchange the information, for this purpose, ad-hoc network came into existence. It implies that if the desired target node is distantly located and is unapproachable then the message is transmitted via other nodes. Generally, the ad-hoc networks follow a multi-hop fashion of communication where each host can also be a router. Besides the consequences such as dynamic Corresponding author Charanjeet Singh: Lovely Professional University, Phagwara, Punjab,, India; Tel: +919463569976; E-mail: [email protected]

*

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

Vehicular Ad-hoc Network

Cross-Industry Blockchain Technology 111

topology and above-listed issues, wireless ad-hoc networks have given tremendous applications to the world in the name of MANET and VANET [2, 3]. These networks are advantageous as they can use the unlicensed frequency spectrum and have a good network; due to which sending and distributing information also become very easy. The clustering algorithms discussed will eliminate the number of issues from the network. A highway is divided into two lanes where vehicular nodes (cars/ other vehicles) move with different velocities. Fig. (1) represents the ad-hoc network structure.

Fig. (1). Ad-hoc Network Structure.

The vehicles start forming a cluster using clustering techniques and the nodes in the cluster are called Cluster Members (CM), among which one node is chosen as the Cluster Head (CH) with the help of clustering algorithms. The clustering algorithms can reduce various efficiency-related issues in the network. There are a number of clustering techniques proposed by various researchers to facilitate the formation of clusters by applying different clustering algorithms. ARCHITECTURE OF VANETS As VANET creates a self-organizing wireless network using its mobile nodes, there also exists a full fledge architecture including other units RSU, OBU, and AU. VANET is a prime component of the Intelligent Transport Network that aims at improving traffic efficiency so as to provide better safety on road. VANET possesses a dynamic topology [4, 5], with frequent connections and disconnections of the vehicular nodes.

112 Cross-Industry Blockchain Technology

Sindhwani et al.

VANETs ensure: ● ● ●

Traffic management Safety management, and Internet services

Fig. (2). VANET-general architecture.

Fig. (2) represents the general architecture of VANET. The VANET architecture follows Wireless Access in Vehicular Environment (WAVE) which is based on 802.11 standard protocol [6] and is used in ITS. WAVE is a specifically designed standard protocol that supports the vehicular environment and also promotes the V2V and V2I communications in 5.9 GHz band licensed for ITS. It uses the multiplexing technique of OFDM orthogonally so as to split the signals. WAVE consists of RSU and OBU, hence WAVE was adopted later. The units used in the vehicular ad hoc network [7] are represented in Table 1. It came into existence because fast communication was required due to the dynamic environment of vehicular scenario that demanded the high speed transfer rate [8]. Earlier the issue faced with 802.11a was its low data rate of 54 Mbps that ultimately resulted in multiple overheads. These protocols permit the vehicles to have a direct communication with no authentication before joining the network. Researchers are further emphasizing on providing the authentication and confidentiality assurance for security reasons.

Vehicular Ad-hoc Network

Cross-Industry Blockchain Technology 113

Table 1. Units description of VANET architecture. Unit

Abbrev.

Description

OBU

• Realizes V2V communication • Communication with other OBUs • Data reliability • Network congestion control • Radio access

Authentication Unit

AU

• Communicates with network via OBU • Responsibilities: - Mobility - Network functioning

Road Side Unit

RSU

• Based on IEEE 802.11p radio technology • Provides internet connectivity to OBUs.

Out Board unit

Fig. (3). Communication architecture.

COMMUNICATION ARCHITECTURE OF VANET VANETs are a victim of frequent disconnections in the dynamic vehicular scenario where the unpredictable movement of the vehicles causes hindrance in the stability mechanism of the network. Once the network is established, the

114 Cross-Industry Blockchain Technology

Sindhwani et al.

information can be disseminated and shared through data packets. Since the vehicles are mobile in nature so connection maintenance is a tough task for moving vehicles where the neighbour nodes can also transcend the transmission range. As a solution to which access points in terms of relay nodes can be predeployed to maintain the connectivity of the network [9]. The vehicles are equipped with the Global Positioning system (GPS) by virtue of which a vehicle can monitor the network and the nodes that will greatly be useful for collision avoidance and to attain information of location. The communication architecture is shown in Fig. (3). Every vehicular node is required to fully process the raw information for the purpose of which, it directly needs a handsome storage capacity. So, it uses rechargeable batteries to generate the power continuously hence making the network more efficient in terms of power and energy. Table 2 represents communication architecture. Table 2. Communication architecture representation. Communication

Functions

In- Vehicle communication

• Vehicle performance detection • Drivers physical condition • Vehicle’s inside environment for safety purpose

V2V communication

• Communication between two or more vehicles • Sharing information: - routing information - Alerts - Driver to driver information • Naive broadcasting (periodic) • Intelligent broadcasting (overcome overheads caused due to the generation of broadcast messages in large number)

V2I communication

• Communication between the vehicles and the infrastructure on the roads • Vehicle density

Vehicle to Broadband cloud Computing

• For the active driver assistance • For vehicle tracking

Routing based communication

• Combination of V2I and V2V • Presents a unicast method • Message transmitted in multi hop fashion till the time it catches up with its destined vehicle.

BLOCKCHAIN MEETS VANET Several studies are conducted for resolving the security issues of VANET, for which blockchain technology is widely used. VANET is used in combination with blockchain [10]. Blockchain technology is used to ensure that data are tamper-

Vehicular Ad-hoc Network

Cross-Industry Blockchain Technology 115

resistant and secure. In some of the algorithms, the registration of the vehicles is mandatory with Registration Authority. The road infrastructure with vehicles and RSU make a blockchain network that reduces security issues. The data generated from the vehicular networks are saved in the cloud for providing data support related applications [11]. Blockchain also introduces the concept of privacy protection for intelligent transportation systems. Fig. (4) represents the Blockchain system.

Fig. (4). Blockchain System

A Blockchain system uses a kind of distributed network that consists of various independent nodes and they generally do not have a trust-based network [12]. Every node takes part in data management. In the implementation, a new block is formed by the participation of various nodes and that new block is included in the blockchain system. All nodes in the system manage the information that ensures the security of data in the blockchain system. The blockchain can manage the information in vehicles as any node can access the previous history while using the public blockchain. In the majority of blockchain based algorithms, a new block is generally shared with all the vehicular nodes. But in some of the cases, the blocks are not shared outside the boundaries of countries as some countries may not be connected directly with roads so the information of a vehicle in one country may not be suitable for the vehicle in another country. The algorithm can be designed on the basis of various parameters. The blockchain network is made on the agreement of vehicular nodes present in the network [13]. The clusters formed in VANET [14] are sometimes useful in blockchain systems as the cluster heads are accountable for managing the blockchain system. So, clustering in

116 Cross-Industry Blockchain Technology

Sindhwani et al.

VANET [15] enhances the security of the network by using the blockchain system. TRUST BASED TECHNOLOGY

MODELS

IN

VANET

FOR

BLOCKCHAIN

There exist three types of models that are trust based. ● ● ●

Entity-based Trust Model Data Centric Trust Model Hybrid based Model

Fig. (5) represents the trust based models in VANET [16]. The opinion of the other nodes matters in the entity based model as here trustworthiness of the nodes is required by using any specified algorithm. But the limitation is the high mobility of the vehicular nodes, as passing of the information is difficult in dynamic topology [17, 18] and high mobility. However, the data centric model focuses on the event information shared by the nodes instead of the node details in the entity based as it is important to share accurate information between the vehicular nodes [19, 20]. Whereas, the hybrid approach uses the combination of the entity based and data centric model. So here the importance is given to both the trustworthiness of the vehicle and event information.

Fig. (5). Trust Based Models

CONCLUSION VANET presents intelligent features including intelligent vehicles that are capable of making adaptive decisions for communication between the two parties i.e. the

Vehicular Ad-hoc Network

Cross-Industry Blockchain Technology 117

sender and the receiver. The major challenge faced can be the delivery of the message to the destination in such harsh traffic conditions with constrained mobility parameters. VANET presents a real-time application but lacks security, scalability, efficient routing and clustering protocols. The significant part of this chapter is to stress upon the blockchain system based security. The blockchain technique is used for accurate information dissemination between the vehicular nodes. Here we concluded that combining the approach of blockchain system with Vehicular ad-hoc network ensures the security of data in the transmission process. CONSENT FOR PUBLICATION Not applicable. CONFLICT OF INTEREST The authors declare no conflict of interest, financial or otherwise. ACKNOWLEDGEMENT Declared none. REFERENCES [1]

G. Martuscelli, A. Boukerche, and P. Bellavista, "Discovering traffic congestion along routes of interest using vanets", In: IEEE Global Telecommunications Conference IEEE GLOBECOM, 2013. [http://dx.doi.org/10.1109/GLOCOM.2013.6831125]

[2]

S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash SyNakamoto, S", Bitcoin: a peer-to-peer Electronic Cash System. J. Gen. Philos. Sci., vol. 39, p. 5367, 2008. [http://dx.doi.org/10.1007/s10838-008-9062-0stem]

[3]

Z. Zheng, S. Xie, H.N. Dai, and H. Wang, "Blockchain Challenges and Opportunities: A Survey", In: Work Pap, 2016, pp. 1-9.

[4]

A.M. Antonopoulos, Mastering Bitcoin First Edit.. OReilly Media, Inc.,: United States of America, 2015.

[5]

N.Z. Aitzhan, and D. Svetinovic, "Security and privacy in decentralized energy trading through multisignatures, blockchain and anonymous messaging streams", IEEE Trans. Depend. Secure Comput., vol. 15, no. 5, pp. 840-852, 2018. [http://dx.doi.org/10.1109/TDSC.2016.2616861]

[6]

B. Ostermaier, F. Dotzer, and M. Strassberger, "Enhancing the security of local danger warnings in vanets-A simulative analysis of voting schemes", The 2nd International Conference on Availability, Reliability and Security, 2007pp. 422-431

[7]

R. Shrestha, and S.Y. Nam, "Access point selection mechanism to circumvent rogue access points using voting-based query procedure", IET Commun, vol. 8, no. 116, pp. 2943-2951, 2014.

[8]

A. Lei, C. Ogah, and E. Al, A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems. vol. Vol. 111. ZTE Communication Magazine, 2016.

[9]

B. Leiding, P. Memarmoshrefi, and D. Hogrefe, "Self-managed and blockchain-based vehicular adhoc networks," in Proceedings of the 2016 ACM International Joint Conference on Pervasive and

118 Cross-Industry Blockchain Technology

Sindhwani et al.

Ubiquitous Computing: Adjunct, ser. UbiComp '16. New York, NY, USA: Association for Computing Machinery, 2016, p. 137-140. [http://dx.doi.org/10.1145/2968219.2971409] [10]

A. Dorri, M. Steger, S.S. Kanhere, and R. Jurdak, "BlockChain: a distributed solution to automotive security and privacy", IEEE Commun. Mag., vol. 55, no. 12, pp. 119-125, 2017. [http://dx.doi.org/10.1109/MCOM.2017.1700879]

[11]

S. Rowan, M. Clear, M. Gerla, M. Huggard, and C Mc Goldrick, "Securing Vehicle to Vehicle Communications Using Blockchain through Visible Light and Acoustic Side- Channels", eprint arXiv:1704.02553.

[12]

Y.L. Morgan, "Notes on DSRC and WAVE standards suite: its architecture, design, and characteristics", IEEE Commun. Surv. Tutor., vol. 12, no. 4, pp. 504-518, 2010. [http://dx.doi.org/10.1109/SURV.2010.033010.00024]

[13]

M. Raya, P. Papadimitratos, V.D. Gligor, and J-P. Hubaux, "On data-centric trust establishment in ephemeral ad hoc networks", IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, pp. 1238-1246, 2008. [http://dx.doi.org/10.1109/INFOCOM.2008.180]

[14]

W. Fan, "Yan Shir, Shanzhi, Chen, Longhao Zou, “Amobility metrics based dynamic clusterinh algorithm for VANETs", In: Proc. IET InterInternational Conference on Communication Technology and Applications (ICCTA- 2011)pp. 752-756.

[15]

S.B. Rasmeet, K. Neeraj, J.P. Joel, and C. Rodrigues, "An Intelligent Clustering Algorithm for VANETs", Proc. Connected Vehicles and Expo International Conference, 2015.

[16]

W. Li, X. Zhang, Z. Shen, M. Zhang, and D. Yang, "Density based threshold algorithm in vehcular adhoc networks", Proc. IEEE International conference on Communication Workshops (ICC), pp. 675680.

[17]

W. Li, X. Zhang, Z. Shen, M. Zhang, and D. Yang, "VANET: Architectures, Research Issues, Routing Protocols, and its Applications", Proc. International Conference on Computing, Communication and Automation, pp. 555-561.

[18]

A. Ahizoune, and A. Hafid, "A New Stability Based Clustering Algorithm (SBCA) for VANETs", Proc. IEEE conference on Local Computer Networks, pp. 843-847. [http://dx.doi.org/10.1109/LCNW.2012.6424072]

[19]

Saleha Mubarak AlMheiri, "Hend Saeed AlQamzi, “MANETs and VANETs Clustering Algorithms: A Survey", Proc. 8th IEEE GCC Conference and Exhibition, pp. 1-6.

[20]

M. Azizian, S. Cherkaoui, and A.S. Hafi, "A Distributed D-hop Cluster Formation for VANET", Proc. IEEE Wireless Communications and Networking Conference, pp. 1-6. [http://dx.doi.org/10.1109/WCNC.2016.7564925]

Cross-Industry Blockchain Technology, 2022, 119-125

119

SUBJECT INDEX A Ad-hoc network(s) 111 structure 111 wireless 111 Agriculture 74, 75, 76, 85, 88, 102 mechanized 75 Algorithmic validation method 19 Algorithms 1, 3, 4, 5, 7, 8, 9, 12, 13, 18, 64, 93, 115, 116 conventional data processing 64 cryptographic 13 elliptic Galois cryptography 13 machine learning 12 Anonymity process 23 Anti-money laundering (AML) 33 Application(s) 2, 34, 51, 59, 60, 64, 69, 74, 88, 92, 95, 96, 97, 99, 101, 105, 110, 111, 115, 117 commercial 64 digital 34 industrial 2, 96 of big data 59, 60 of blockchain technology 51 real-time 117 Architecture 53, 105 four-layer 105 satellite multi-sensor 53 Artificial neural network 12 Authentication 9, 11, 13, 14, 15, 50, 94, 96, 100, 112 control rights 11 method 13 server requirements, third-party 11 Authorities 3, 23, 32, 92, 98 credit card 3 regulatory 23 Automated 38, 74, 76 greenhouse monitoring system 76 organizations 38 system 74, 76 Automating processes 29

Autonomous 14, 39 decentralized peer-to-peer telemetry 14 transaction agents 39

B Bandwidth 7, 13 consumption 7 issues 13 Basic blockchain structure 78 Big data 57, 58, 64, 65, 66, 67, 68, 89 analysis tools and techniques 65 analytics 57, 64, 66, 68 and IoT 89 in remote sensing data 65 issues 57 machine learning problems, tackled 58 program 64 techniques 67 tools 57 Bitcoin 2, 3, 5, 7, 18, 20, 23, 25, 31, 32, 33, 36, 48, 49 cash 2 community 31 exchange 23 system 25 Blockchain 3, 10, 14, 15, 23, 25, 27, 31, 32, 34, 39, 47, 48, 51, 68, 69, 77, 78, 79, 80, 92, 93, 94, 115, 116, 117 and big data 69 applications 15, 47 based system 34 bitcoin 23, 25, 34 complements 14 consortium 77, 80 database 48 for securing IoT applications 92 framework 34 harness 39 infrastructure 34 IoT security 15 network 51, 68, 77, 78, 115

Rajesh Singh, Anita Gehlot, Bhavesh Dharmani and Kamal Kumar (Eds.) All rights reserved-© 2022 Bentham Science Publishers

120 Cross-Industry Blockchain Technology

process 3 scalability 31 solution 93, 94 system 14, 32, 79, 115, 116, 117 technique 10, 117 transaction 27 Blockchain data 69, 79 analysing 79 Blockchain technology 2, 23, 50 and decentralization 50 for bitcoin 23 register 2 Blocks, genesis 27 Broadband cloud computing 114 Businesse(s) 29, 36, 38, 47, 48, 51, 54, 55, 56, 57, 58, 62, 67 automated 38 big 67 performance 57 processes 47

C Cash assets 40 Chronic illness 103 Cloud-based 56, 75 analytics 56 ICT systems 75 Cloud computing 75, 92, 104 and IoT application software 92 Cloud storage 90 Clustering 58, 111, 115 algorithms 111 density-based 58 hierarchical 58 partitioning 58 techniques 111 Cluster(s) 58, 66, 91, 111, 115 computer 66 head (CH) 111, 115 members 111 Combat financial terrorism (CFT) 33 Communication 13, 78, 91, 93, 110, 112, 113, 114, 116

Singh et al.

architecture 113, 114 architecture of VANET 113 based 114 fast 112 secure 13 smooth 93 Computational 7, 10, 25 capacity 10 resources 7, 25 Confidential data 13, 54 encrypted 13 Connectivity issues 12 Consensus 4, 6, 7, 19, 20, 24, 25, 27, 29, 32, 34, 48, 67, 69, 79, 92 mechanism 6, 19, 20, 24, 25, 27, 29, 34, 48 processes 48, 79, 92 techniques 79 validation 4 Content distributed network (CDN) 96 Coronavirus 103, 104 Cost 14, 24, 25, 28, 29, 31, 62, 78 fundamental storage 78 heavy computational 25 reconciliation 29 COVID-19 99, 101, 102, 105 fight 101 monitoring 105 Credit fraud 34 Criminal activity 90 Crop(s) 81, 86 cycles 81 growing 86 Cross-border 32, 35 digital ledger system 32 remittances 35 transfers efficiency 35 Cryptocurrency 36, 47 and big data 47 exchanges 36 Cryptographic methodology 24 Cryptography 13, 18, 49, 79 symmetric 13 techniques 18 Currencies 4, 18, 20, 22, 23, 36, 90, 97 crypto 20, 90, 97

Subject Index

technological 18 virtual 23 Currency-based ledger system 87 Customer due diligence (CDD) 33 Cyber-attacks 29, 87, 90, 95, 96, 102, 105 Cybercriminals 69 Cybersecurity 31

D DAO software 38 Data 2, 7, 10, 11, 12, 32, 47, 54, 55, 57, 58, 67, 68, 69, 76, 77, 78, 92, 93, 94, 96, 115 analytics 58, 67, 68 and transaction jurisdiction 32 communication 10 compliance issues 12 compression 58 computation 2 exchange 47 management 57, 69, 94, 115 processing 57, 93 propagation 96 protection 54, 77, 92 severity 55 sharing 68 sources 55 transfer 11, 78 transmission 7, 76 Data analysis 68, 69 duplicate 68 large-scale real-time 69 Data mining 58, 59, 94 methods 58 Data mining technique(s) 58, 59, 60 for big data 58 Data storage 7, 48, 62 big 48 secure 7 Decentralization of IoT network 14 Decentralized system 3, 6, 95 Deep neural network 12 Design 24, 33, 74

Cross-Industry Blockchain Technology 121

algorithmic 24 Development 15, 20, 24, 30, 31, 32, 42, 58, 59, 87, 88, 92, 96, 98 futuristic 98 Device(s) 1, 2, 7, 8, 9, 10, 11, 12, 13, 14, 15, 60, 88, 91, 95, 96, 100, 104, 105 authentication 10 autonomous wireless 105 gateway 13 fitness 60 medical 100, 104 mobile 9, 12 networking 9 resources 95 wearable 7, 8, 9, 13, 88, 100, 104 Digital 3, 4, 18, 20, 21, 22, 23, 25, 35, 42, 62, 83 currencies 3, 18, 20, 21, 22, 23, 25, 35, 42 data link 4 ID systems 35 methods 62 ocean droplet 83 Digital ledger 18, 20, 21, 24, 30, 32, 33, 34, 40, 41, 42 consensus mechanism 24 environment 32 platforms 40 systems 33 technology 18, 20, 21, 30, 34, 41, 42 Digital signatures 6, 13, 25, 26, 27, 28, 54, 90 public Key Encryption 13 and hash functions 25 Disease 89, 90, 98, 99 predicting 89 DLT-based 30, 37 collateral registry system 30 methodology 37

E Earth exploration blockchains 53 Earth observation system data 64 and information system (EOSDIS) 64 ECC algorithm 6

122 Cross-Industry Blockchain Technology

Economy 20, 21, 22 developing 21 Eco system 103 Electricity consumption 25 Emerging technologies 1, 7, 75 Encryption 5, 8, 10, 13, 91, 94 algorithms 10, 13 symmetric 5 Encryption technology 48 Energy 9, 88, 91, 95, 101, 114 conserving 9 consumption 91 Environment 47, 68, 99, 112, 114 dynamic 112 vehicular 112 Ethereum community 38 European parliamentary research service 101 (EPRS) 101

F Fabric framework 31 Financial systems 3, 35 Fog 11, 104 computing 11, 104 node isolation 11 Food 74, 85, 86 organic 86 Framework 33, 67, 68 blockchain-based Big Data 68 distributed computing 67 reverse transaction 33

G Gadgets 15, 100 intelligent 15 Glitch, technical 102 Global positioning system (GPS) 114 Greenhouse 74, 80, 81, 83, 86 monitoring system 86

Singh et al.

H Hash 5, 6, 7, 25, 26, 28, 51, 78, 79, 90 cryptographic 90 functions 5, 7, 25 Hashing 5, 6, 13, 54 function 6 Health 88, 89, 98, 100, 101 application network 101 Healthcare 50, 51, 52, 59, 60, 61, 62, 87, 88, 89, 90, 96, 98, 99, 100, 101, 103, 104, 105 applications 51 data 62, 87 digital 104 facilities 103, 104 industry 52 revolutionize 100 sector 59, 60, 61, 87, 88, 89, 90, 99, 100, 101, 105 services 103 Healthcare transaction 51, 52 in blockchain 52 Herbs, green 76 High-bandwidth wireless technologies 75 Hydroponics system 81, 83 Hyperledger fabric and digital assets 40

I Illegal access networks 96 Immunotherapy 98 Immutable ledger records 14 Industries 7, 22, 29, 34, 39, 48, 50, 60, 74, 78, 80, 85, 91, 98, 102 electricity 50 financial 29, 91 financial services 22, 39 manufacturing 102 Information 10, 47 system 47 transmission 10 Integration of blockchain 67, 69 Integrity 5, 6, 8, 14, 15, 94

Subject Index

blockchain’s 5 Intelligence 12, 58, 75, 89, 91, 92, 96, 103 artificial 58, 75, 91, 92, 96, 103 Intelligent 93, 114 broadcasting 114 sensors 93 Internet 18, 100 of medical things (IoMT) 100 telephony 18 Interoperability 31, 51 traditional 51 IoT 11, 14, 97, 99, 103 and BCT amalgamation 97 and blockchain complements 14 and healthcare sector 99 blockchain 11 systems 97, 103 technologies and application frameworks 11 IoT applications 1, 93, 103 and healthcare 103 IoT devices 1, 8, 9, 10, 13, 88, 91, 93, 95, 98, 101, 103, 104 IoT network 9, 11, 12, 13, 14, 78, 97 information 78 securing 11

L Learning 52, 58, 62, 103 data stream 58 process 52 Liquidity-savings mechanism (LSM) 39 Logic 30, 36 collateral transactions business 30

M Machine 12, 14, 47, 52, 58, 67, 96, 103 automated washing 14 coffee 96 learning 12, 47, 52, 58, 67 Malnutrition 85 Management 15, 42, 51, 62

Cross-Industry Blockchain Technology 123

health record 15 Market 9, 10, 21, 34, 40, 50, 60 blockchain-backed 34 domestic 21 Mechanism 5, 24, 33, 39 liquidity-savings 39 MEMs technology 93 Mobile ad-hoc networks (MANETs) 110, 111 Mortgage process 37 Multi-hop radio network 110 Multimedia 102, 105 preserving healthcare 105

N Naive 59, 114 Bayes codes 59 broadcasting 114 Network 9, 10, 11, 12, 13, 15, 19, 20, 24, 25, 27, 31, 32, 48, 59, 90, 91, 93, 94, 110, 111, 113, 114, 115 adhoc 110 of plentiful things (NPT) 90 security 25, 31 social 59 trust-based 115 NFT technique 83 Non-hackable system 102 Nutrient(s) 76 film technique 76 plants 76

P People's bank of China (PBoC) 21 Permissionless systems 32, 33 Permissions 23, 25, 33, 79, 91, 92, 98 role-based 23 Perpetuity nature 29 Pesticides 74, 86 Plants 75, 76, 77, 80, 81 fast-growing 76 Platforms 23, 30, 37, 42, 52, 74, 93 digital 23

124 Cross-Industry Blockchain Technology

securities settlement 42 Polio vaccine 98 Privacy 104, 115 problems 104 protection 115 Private sector 20 organizations 20 players 20 Problem(s) 12, 14, 51, 58, 61, 62, 64, 65, 88, 89, 90, 91, 92, 96, 97, 98, 99, 103 oriented medical records (POMR) 98, 99 solving 103 technology-related 51 Process 3, 7, 10, 31, 35, 41, 66, 68, 76, 77, 83, 86, 87, 88, 92, 98 mining 88 negotiation 98 of consensus (PoC) 92 volumetric transactions 31 Programming languages 66 Protected health information (PHI) 100, 104 Pseudonymity 79 Public 5, 6, 25, 26, 27, 38, 48, 77, 79, 80, 115 blockchain 38, 48, 79, 80, 115 key cryptography 5, 6, 25, 26, 27, 77 Python 66

R Radio frequency identification (RFIDs) 92, 93, 95 Reforms 47, 89, 105 innovative 89 revolutionary 47 Regression 59 logistic 59 tree 59 Regulatory 8, 15, 32 issues 32 policies 8, 15 Remote 64, 67, 88, 89, 100, 101 patient monitoring (RPM) 88, 89, 100, 101 procedure call (RPC) 67 sensing techniques 64

Singh et al.

Resources 6, 7, 20, 32, 95, 100 core computation 7 Respiratory system 103 RTGS 41, 42 prototype 42 system 41

S Satellite imagery 64 Satellites 53, 64 multi-sensor 53 Scalability 28, 30, 31, 52, 58, 66, 90, 93, 94, 97, 117 Scenario 3, 8, 10, 102, 103 probabilistic authentication 103 variant IoT 8 Secure 110 message transmission 110 network 110 Securing IoT applications 92 Security 1, 2, 8, 11, 12, 13, 15, 23, 24, 30, 37, 39, 51, 90, 95, 101, 102, 104, 117 financial transaction 2 methods 90 properties 104 risks 102 settlement systems 30 transactions 37 Security framework 12, 53, 105 cryptographic 53 edge-based 12 Sensors 7, 8, 9, 76, 81, 82, 83, 93, 97, 99, 104 humidity 81 vehicular 7, 9 Service providers 64 Settlement 22, 30, 32, 34, 36, 40, 41, 42 cross-currency fund 36 processes 34 system (SAMOS) 30, 32, 41 Smart 11, 50, 93, 98 contracting network 50 manufacturing 98 phones 11, 93

Subject Index

Smart contracts 38, 100 automated 38 implementing 100 Social network analysis (SNA) 59 Soil 64, 81 degradation 64 depletion 81 Sources 13, 55, 60, 64, 67, 74, 76, 101 medical 13 South African reserve Bank (SARB) 22, 41 Stock exchanges 34 Stolen 38, 54 funds 38 passwords 54 Support vector machines (SVM) 12, 59 Symbiotic relationship 102 Symmetric encryption approach 13 Synchronization 11, 81, 83 issues 11 Systemic stratification 55

T Techniques 12, 13, 59, 75 complicated encryption 13 random forest 12 regression 59 sustainable farming 75 Techno-libertarianism 23 Tools 1, 20, 32, 56, 65, 66, 67, 68, 76, 89, 100 economic management 20 Topology, dynamic 111, 116 Touch Screen 82 Traditional healthcare methods 100 Traffic management 112 Transaction(s) 2, 3, 4, 6, 10, 15, 18, 23, 29, 30, 33, 35, 48, 49, 50, 52, 78, 79, 90, 91 automatic 49 autonomous 91 bitcoin 23 committed 78 financial 15 process 79 processing 52

Cross-Industry Blockchain Technology 125

technologies 18 validation 23, 78 volumetric 30 Transfer, instant money 36 Transforming blockchain in education 53 Transmission 8, 99, 117 wireless 99 process 117 Transportation systems, intelligent 115 Treatment processes 99

V Validation 3, 4, 6, 24, 55, 78 cryptographic 24 VANET architecture 112, 113 Vehicle(s) 111, 112, 113, 114, 115, 116 density 114 intelligent 116 tracking 114 Vehicular ad-hoc Networks (VANET) 110, 111, 112, 113, 114, 115, 116, 117 Vending machines 37

W Water 64, 77, 81, 82 diluted tap 77 pollution 64 Wireless 92, 93, 95, 100, 110, 112 access in vehicular environment (WAVE) 112 body area networks (WBANs) 100 communication 110 sensors network (WSNs) 92, 93, 95 World Health Organization (WHO) 89